Sciweavers

3239 search results - page 461 / 648
» A Logical Process Calculus
Sort
View
140
Voted
SP
2002
IEEE
147views Security Privacy» more  SP 2002»
15 years 3 months ago
CX: A scalable, robust network for parallel computing
CX, a network-based computational exchange, is presented. The system's design integrates variations of ideas from other researchers, such as work stealing, non-blocking tasks...
Peter R. Cappello, Dimitros Mourloukos
145
Voted
TCAD
2002
134views more  TCAD 2002»
15 years 3 months ago
Testing and diagnosis of interconnect faults in cluster-based FPGA architectures
As IC densities are increasing, cluster-based FPGA architectures are becoming the architecture of choice for major FPGA manufacturers. A cluster-based architecture is one in which...
Ian G. Harris, Russell Tessier
150
Voted
IEEEHPCS
2010
15 years 2 months ago
Semantic model checking security requirements for web services
Model checking is a formal verification method widely accepted in the web service world because of its capability to reason about service behaviors, at their process-level. It ha...
L. Boaro, E. Glorio, Francesco Pagliarecci, Luca S...
138
Voted
RULEML
2010
Springer
15 years 1 months ago
Transformation of SBVR Compliant Business Rules to Executable FCL Rules
 The  main  source  of  changing  requirements  of  the  dynamic  business   environment  is  response  to  changes  in  regulations  and  contracts  towards  ...
Aqueo Kamada, Guido Governatori, Shazia Wasim Sadi...
145
Voted
EUSFLAT
2009
220views Fuzzy Logic» more  EUSFLAT 2009»
15 years 1 months ago
Web Usage Mining: users' navigational patterns extraction from web logs using ant-based clustering method
Web Usage Mining is the process of applying data mining techniques to the discovery of usage patterns from data extracted from Web Log files. It mines the secondary data (web logs)...
Kobra Etminani, Mohammad R. Akbarzadeh-Totonchi, N...