Sciweavers

1308 search results - page 249 / 262
» Application of Hazard Analysis to Software Quality Modelling
Sort
View
STORAGESS
2005
ACM
15 years 11 months ago
Security of erasable memories against adaptive adversaries
We study cryptographic modeling and encryption-based design techniques for guaranteeing privacy of data that is first stored in some type of computer memory and then deleted. We ...
Giovanni Di Crescenzo
135
Voted
APPINF
2003
15 years 6 months ago
Hardware Impact on Communication Performance of Beowulf LINUX Cluster
There exist a lot of models of parallel computation, amongst which LogP and LogGP are famous and suitable to describe the framework of communication process of Beowulf LINUX Clust...
Yuan Tang, Yun-Quan Zhang, Jia-Chang Sun, Yu-Cheng...
STTT
1998
130views more  STTT 1998»
15 years 5 months ago
The Practitioner's Guide to Coloured Petri Nets
Abstract. Coloured Petri nets (CP-nets or CPNs) provide a framework for the design, specification, validation, and verification of systems. CP-nets have a wide range of applicati...
Lars Michael Kristensen, Søren Christensen,...
181
Voted
ICOODB
2009
246views Database» more  ICOODB 2009»
15 years 3 months ago
Compiler Plugins Can Handle Nested Languages: AST-Level Expansion of LINQ Queries for Java
The integration of database and programming languages is made difficult by the different data models and type systems prevalent in each field. Functional-object query languages con...
Miguel Garcia
TCAD
2010
118views more  TCAD 2010»
15 years 21 hour ago
Design Tools for Digital Microfluidic Biochips: Toward Functional Diversification and More Than Moore
Abstract--Microfluidics-based biochips enable the precise control of nanoliter volumes of biochemical samples and reagents. They combine electronics with biology, and they integrat...
Krishnendu Chakrabarty, Richard B. Fair, Jun Zeng