Sciweavers

2357 search results - page 347 / 472
» Computing Refactorings of Behavior Models
Sort
View
CAD
2005
Springer
15 years 3 months ago
Computer-aided characterization for effective mechanical properties of porous tissue scaffolds
Performance of various functions of the tissue structure depends on porous scaffold microstructures with specific porosity characteristics that influence the behavior of the incor...
Zhibin Fang, Binil Starly, Wei Sun
DAC
1998
ACM
16 years 4 months ago
Design and Specification of Embedded Systems in Java Using Successive, Formal Refinement
Successive, formal refinement is a new approach for specification of embedded systems using a general-purpose programming language. Systems are formally modeled as Abstractable Sy...
James Shin Young, Josh MacDonald, Michael Shilman,...
ICCAD
2004
IEEE
94views Hardware» more  ICCAD 2004»
16 years 1 days ago
Timing macro-modeling of IP blocks with crosstalk
With the increase of design complexities and the decrease of minimal feature sizes, IP reuse is becoming a common practice while crosstalk is becoming a critical issue that must b...
Ruiming Chen, Hai Zhou
WWW
2009
ACM
15 years 10 months ago
A general framework for adaptive and online detection of web attacks
Detection of web attacks is an important issue in current defense-in-depth security framework. In this paper, we propose a novel general framework for adaptive and online detectio...
Wei Wang 0012, Florent Masseglia, Thomas Guyet, Re...
P2P
2008
IEEE
15 years 9 months ago
Incentives Against Hidden Action in QoS Overlays
Peer-to-peer networks providing QoS-enabled services are sensitive to hidden action situations, where the actions of a server peer are hidden from the peers who receive services f...
Raul Landa, Miguel Rio, David Griffin, Richard G. ...