Sciweavers

2123 search results - page 326 / 425
» Composition of Cyber-Physical Systems
Sort
View
101
Voted
ICCAD
1996
IEEE
127views Hardware» more  ICCAD 1996»
15 years 5 months ago
Comparing models of computation
We give a denotational framework (a "meta model") within which certain properties of models of computation can be understood and compared. It describes concurrent proces...
Edward A. Lee, Alberto L. Sangiovanni-Vincentelli
COMPSAC
2007
IEEE
15 years 4 months ago
Unified Property Specification for Hardware/Software Co-Verification
Hardware/software co-verification is becoming an indispensable tool for building highly trustworthy embedded systems. A stumbling block to effective co-verification using model ch...
Fei Xie, Huaiyu Liu
ESORICS
2006
Springer
15 years 4 months ago
Secure Key-Updating for Lazy Revocation
Abstract. We consider the problem of efficient key management and user revocation in cryptographic file systems that allow shared access to files. A performanceefficient solution t...
Michael Backes, Christian Cachin, Alina Oprea
FM
2006
Springer
113views Formal Methods» more  FM 2006»
15 years 4 months ago
Interface Input/Output Automata
We propose a new look at one of the most fundamental types of behavioral interfaces: discrete time specifications of communication--directly related to the work of de Alfaro and H...
Kim Guldstrand Larsen, Ulrik Nyman, Andrzej Wasows...
99
Voted
ER
2000
Springer
105views Database» more  ER 2000»
15 years 4 months ago
TBE: Trigger-By-Example
One of the obstacles that hinder database trigger systems from their wide deployment is the lack of tools that aid users in creating trigger rules. Similar to understanding and spe...
Dongwon Lee, Wenlei Mao, Wesley W. Chu