Sciweavers

8655 search results - page 506 / 1731
» Challenges for Trusted Computing
Sort
View
IJMSO
2010
118views more  IJMSO 2010»
15 years 3 months ago
Dependencies between ontology design parameters
: Development and use of ontologies is increasing, but hampered by new challenges, such as determining which ontologies to reuse and which language to use. Ontology development met...
C. Maria Keet
IFM
2010
Springer
132views Formal Methods» more  IFM 2010»
15 years 2 months ago
From Operating-System Correctness to Pervasively Verified Applications
Though program verification is known and has been used for decades, the verification of a complete computer system still remains a grand challenge. Part of this challenge is the in...
Matthias Daum, Norbert Schirmer, Mareike Schmidt
133
Voted
ESTIMEDIA
2009
Springer
15 years 2 months ago
Efficient execution of Kahn process networks on multi-processor systems using protothreads and windowed FIFOs
As single-processor systems are ceasing to scale effectively, multi-processor systems are becoming more and more popular. While there are many challenges of designing multi-process...
Wolfgang Haid, Lars Schor, Kai Huang, Iuliana Baci...
FAC
2010
106views more  FAC 2010»
15 years 2 months ago
Automatic verification of Java programs with dynamic frames
Framing in the presence of data abstraction is a challenging and important problem in the verification of object-oriented programs [LLM07]. The dynamic frames approach is a promisi...
Jan Smans, Bart Jacobs, Frank Piessens, Wolfram Sc...
CNSM
2010
14 years 8 months ago
Towards non-expert users monitoring networks and services through semantically enhanced visualizations
— Managing networks and services in large virtual enterprises often requires significant expertise to decipher and reconcile information coming from several heterogeneous sources...
Owen Conlan, John Keeney, Cormac Hampson, Fion&aac...