Sciweavers

16404 search results - page 300 / 3281
» A set coverage problem
Sort
View
ICSE
2007
IEEE-ACM
16 years 4 months ago
Testing and Analysis of Access Control Policies
Policy testing and analysis are important techniques for high assurance of correct specification of access control policies. We propose a set of testing and analysis techniques fo...
Evan Martin
ICDCS
2009
IEEE
16 years 1 months ago
The Digital Marauder's Map: A New Threat to Location Privacy
“The Marauder’s Map” is a magical map in J. K. Rowling’s fantasy series, “Harry Potter and the Prisoner of Azkaban”. It shows all moving objects within the “Hogwarts...
Xinwen Fu, Nan Zhang 0004, Aniket Pingley, Wei Yu,...
QOSA
2007
Springer
15 years 10 months ago
Architectural Knowledge: Getting to the Core
Different organizations or organizational units are likely to store and maintain different types of information about their software architectures. This inhibits effective manageme...
Remco C. de Boer, Rik Farenhorst, Patricia Lago, H...
WMPI
2004
ACM
15 years 10 months ago
Memory coherence activity prediction in commercial workloads
Abstract. Recent research indicates that prediction-based coherence optimizations offer substantial performance improvements for scientific applications in distributed shared memor...
Stephen Somogyi, Thomas F. Wenisch, Nikolaos Harda...
UML
2004
Springer
15 years 10 months ago
The AGEDIS Tools for Model Based Testing
We describe the tools and interfaces created by the AGEDIS project, a European Commission sponsored project for the creation of a methodology and tools for automated model driven ...
Alan Hartman, Kenneth Nagin