Sciweavers

1894 search results - page 190 / 379
» A TLA Proof System
Sort
View
EJIS
2007
87views more  EJIS 2007»
15 years 4 months ago
Identifying healthcare actors involved in the adoption of information systems
The adoption of information systems in healthcare is no less significant than in any other commercial or caring organisation. The literature on IS adoption in healthcare, makes it...
Vasiliki Mantzana, Marinos Themistocleous, Zahir I...
LPAR
2010
Springer
15 years 2 months ago
Verifying Pointer and String Analyses with Region Type Systems
Pointer analysis statically approximates the heap pointer structure during a program execution in order to track heap objects or to establish alias relations between references, a...
Lennart Beringer, Robert Grabowski, Martin Hofmann
APSEC
2009
IEEE
15 years 2 months ago
A Formal Framework to Integrate Timed Security Rules within a TEFSM-Based System Specification
Abstract--Formal methods are very useful in software industry and are becoming of paramount importance in practical engineering techniques. They involve the design and the modeling...
Wissam Mallouli, Amel Mammar, Ana R. Cavalli
RTCSA
2008
IEEE
15 years 10 months ago
Scheduler-Assisted Prefetching: Efficient Demand Paging for Embedded Systems
In an attempt to substitute NOR flash with NAND flash and provide more memory to applications, embedded systems have to use demand paging. However, demand paging drastically degra...
Stanislav A. Belogolov, Jiyong Park, Jungkeun Park...
ICDCS
2007
IEEE
15 years 10 months ago
Combating Double-Spending Using Cooperative P2P Systems
An electronic cash system allows users to withdraw coins, represented as bit strings, from a bank or broker, and spend those coins anonymously at participating merchants, so that ...
Ivan Osipkov, Eugene Y. Vasserman, Nicholas Hopper...