Sciweavers

3256 search results - page 476 / 652
» Applications of Formal Methods to System Design and Verifica...
Sort
View
160
Voted
ICCCN
2008
IEEE
15 years 11 months ago
A Structured Hardware/Software Architecture for Embedded Sensor Nodes
—Owing to the limited requirement for sensor processing in early networked sensor nodes, embedded software was generally built around the communication stack. Modern sensor nodes...
Geoff V. Merrett, Alex S. Weddell, Nick R. Harris,...
WWW
2008
ACM
16 years 6 months ago
Organizing the unorganized - employing IT to empower the under-privileged
Various sectors in developing countries are typically dominated by the presence of a large number of small and microbusinesses that operate in an informal, unorganized manner. Man...
Arun Kumar, Nitendra Rajput, Sheetal K. Agarwal, D...
OTM
2007
Springer
15 years 11 months ago
Understanding the Occurrence of Errors in Process Models Based on Metrics
Abstract. Business process models play an important role for the management, design, and improvement of process organizations and processaware information systems. Despite the exte...
Jan Mendling, Gustaf Neumann, Wil M. P. van der Aa...
TCS
2010
15 years 3 months ago
Arrows for secure information flow
This paper presents an embedded security sublanguage for enforcing informationflow policies in the standard Haskell programming language. The sublanguage provides useful informat...
Peng Li, Steve Zdancewic
OSDI
1996
ACM
15 years 6 months ago
Safe Kernel Extensions Without Run-Time Checking
This paper describes a mechanism by which an operating system kernel can determine with certainty that it is safe to execute a binary supplied by an untrusted source. The kernel r...
George C. Necula, Peter Lee