Sciweavers

102 search results - page 14 / 21
» Automated Dependability Analysis of UML Designs
Sort
View
ICECCS
2009
IEEE
161views Hardware» more  ICECCS 2009»
15 years 7 months ago
Formal Modelling and Analysis of Business Information Applications with Fault Tolerant Middleware
Distributed information systems are critical to the functioning of many businesses; designing them to be dependable is a challenging but important task. We report our experience i...
Jeremy Bryans, John S. Fitzgerald, Alexander Roman...
DAC
1997
ACM
15 years 4 months ago
System Level Fixed-Point Design Based on an Interpolative Approach
The design process for xed-point implementations either in software or in hardware requires a bit-true speci cation of the algorithm in order to analyze quantization e ects on an...
Markus Willems, Volker Bürsgens, Holger Kedin...
115
Voted
VOTEID
2007
Springer
15 years 6 months ago
Assessing Procedural Risks and Threats in e-Voting: Challenges and an Approach
Performing a good security analysis on the design of a system is an essential step in order to guarantee a reasonable level of protection. However, different attacks and threats m...
Komminist Weldemariam, Adolfo Villafiorita, Andrea...
DAC
2007
ACM
16 years 1 months ago
Width-dependent Statistical Leakage Modeling for Random Dopant Induced Threshold Voltage Shift
Statistical behavior of device leakage and threshold voltage shows a strong width dependency under microscopic random dopant fluctuation. Leakage estimation using the conventional...
Jie Gu, Sachin S. Sapatnekar, Chris H. Kim
88
Voted
TARK
1998
Springer
15 years 4 months ago
The Learning Power of Belief Revision
Belief revision theory aims to describe how one should change one's beliefs when they are contradicted by newly input information. The guiding principle of belief revision th...
Kevin T. Kelly