Sciweavers

1308 search results - page 249 / 262
» Application of Hazard Analysis to Software Quality Modelling
Sort
View
STORAGESS
2005
ACM
15 years 5 months ago
Security of erasable memories against adaptive adversaries
We study cryptographic modeling and encryption-based design techniques for guaranteeing privacy of data that is first stored in some type of computer memory and then deleted. We ...
Giovanni Di Crescenzo
APPINF
2003
15 years 1 months ago
Hardware Impact on Communication Performance of Beowulf LINUX Cluster
There exist a lot of models of parallel computation, amongst which LogP and LogGP are famous and suitable to describe the framework of communication process of Beowulf LINUX Clust...
Yuan Tang, Yun-Quan Zhang, Jia-Chang Sun, Yu-Cheng...
STTT
1998
130views more  STTT 1998»
14 years 11 months ago
The Practitioner's Guide to Coloured Petri Nets
Abstract. Coloured Petri nets (CP-nets or CPNs) provide a framework for the design, specification, validation, and verification of systems. CP-nets have a wide range of applicati...
Lars Michael Kristensen, Søren Christensen,...
ICOODB
2009
246views Database» more  ICOODB 2009»
14 years 9 months ago
Compiler Plugins Can Handle Nested Languages: AST-Level Expansion of LINQ Queries for Java
The integration of database and programming languages is made difficult by the different data models and type systems prevalent in each field. Functional-object query languages con...
Miguel Garcia
TCAD
2010
118views more  TCAD 2010»
14 years 6 months ago
Design Tools for Digital Microfluidic Biochips: Toward Functional Diversification and More Than Moore
Abstract--Microfluidics-based biochips enable the precise control of nanoliter volumes of biochemical samples and reagents. They combine electronics with biology, and they integrat...
Krishnendu Chakrabarty, Richard B. Fair, Jun Zeng