Sciweavers

19 search results - page 3 / 4
» A light-weight static approach to analyzing UML behavioral p...
Sort
View
FASE
2010
Springer
14 years 5 days ago
Performance Modeling and Analysis of Context-Aware Mobile Software Systems
Abstract. Context-awareness is becoming a first class attribute of software systems. In fact, applications for mobile devices need to be aware of their context in order to adapt t...
Luca Berardinelli, Vittorio Cortellessa, Antinisca...
SIGSOFT
2007
ACM
14 years 6 months ago
Detection and resolution of atomicity violation in service composition
Atomicity is a desirable property that safeguards application consistency for service compositions. A service composition exhibiting this property could either complete or cancel ...
Chunyang Ye, S. C. Cheung, W. K. Chan, Chang Xu
CCR
2004
151views more  CCR 2004»
13 years 5 months ago
Practical verification techniques for wide-area routing
Protocol and system designers use verification techniques to analyze a system's correctness properties. Network operators need verification techniques to ensure the "cor...
Nick Feamster
TREC
2003
13 years 6 months ago
Knowledge-Based Access to the Bio-Medical Literature, Ontologically-Grounded Experiments for the TREC 2003 Genomics Track
The Tarragon Consulting team participated in the primary task of the TREC 2003 Genomics Track. We used a combination of knowledge-engineering and corpus analysis to construct sema...
Richard Tong, John Quackenbush, Mark Snuffin
ISCA
2011
IEEE
269views Hardware» more  ISCA 2011»
12 years 9 months ago
Crafting a usable microkernel, processor, and I/O system with strict and provable information flow security
High assurance systems used in avionics, medical implants, and cryptographic devices often rely on a small trusted base of hardware and software to manage the rest of the system. ...
Mohit Tiwari, Jason Oberg, Xun Li 0001, Jonathan V...