Sciweavers

3801 search results - page 644 / 761
» An Approach to Modeling Software Safety
Sort
View
SERA
2005
Springer
15 years 3 months ago
Bridging the Gap between Analysis and Design Using Dependency Diagrams
Requirements specifications often make use of a number of scenarios that are interrelated and that depend on each other in many ways. However, they are often treated separately, o...
Simona Vasilache, Jiro Tanaka
PRIMA
2004
Springer
15 years 3 months ago
Handling Emergent Resource Use Oscillations
— Distributed computing systems are increasingly being created as self-organizing collections of many autonomous (human or software) agents cooperating as peers. Peer-to-peer coo...
Mark Klein, Richard Metzler, Yaneer Bar-Yam
SAMOS
2004
Springer
15 years 3 months ago
Self-loop Pipelining and Reconfigurable Dataflow Arrays
Abstract. This paper presents some interesting concepts of static dataflow machines that can be used by reconfigurable computing architectures. We introduce some data-driven reconf...
João M. P. Cardoso
DEXAW
2003
IEEE
131views Database» more  DEXAW 2003»
15 years 3 months ago
Privacy and Trusted Computing
This paper examines a model of trusted computing wherein a computing platform is able to make assertions about its current software configuration that may be trusted by the user ...
Juan Manuel González Nieto, Ed Dawson, Eiji...
GLOBAL
2003
Springer
15 years 3 months ago
Performance Evaluation for Global Computation
Abstract. Global computing applications co-ordinate distributed computations across widely-dispersed hosts. Such systems present formidable design and implementation challenges to ...
Linda Brodo, Pierpaolo Degano, Stephen Gilmore, Ja...