Sciweavers

1518 search results - page 212 / 304
» Cryptographic Test Correction
Sort
View
118
Voted
TASE
2007
IEEE
15 years 7 months ago
Model Checking Software at Compile Time
Software has been under scrutiny by the verification community from various angles in the recent past. There are two major algorithmic approaches to ensure the correctness of and...
Ansgar Fehnker, Ralf Huuck, Patrick Jayet, Michel ...
103
Voted
TPHOL
2007
IEEE
15 years 7 months ago
Formalising Java's Data Race Free Guarantee
We formalise the data race free (DRF) guarantee provided by Java, as captured by the semi-formal Java Memory Model (JMM) [1] and published in the Java Language Specification [2]. ...
David Aspinall, Jaroslav Sevcík
124
Voted
VTC
2007
IEEE
125views Communications» more  VTC 2007»
15 years 7 months ago
Channel Decoder Assisted Adaptive Coding and Modulation for HAP Communications
Provision of mobile broadband wireless access, for instance via high altitude platforms (HAPs) to the passengers on a high-speed train, requires the development of efficient and r...
Miha Smolnikar, Tomaz Javornik, Mihael Mohorcic
109
Voted
ILP
2007
Springer
15 years 6 months ago
Applying Inductive Logic Programming to Process Mining
The management of business processes has recently received a lot of attention. One of the most interesting problems is the description of a process model in a language that allows ...
Evelina Lamma, Paola Mello, Fabrizio Riguzzi, Serg...
119
Voted
IWSOS
2007
Springer
15 years 6 months ago
The Development of a Wireless Sensor Network Sensing Node Utilising Adaptive Self-diagnostics
— In Wireless Sensor Network (WSN) applications, sensor nodes are often deployed in harsh environments. Routine maintenance, fault detection and correction is difficult, infrequ...
Hai Li, Mark C. Price, Jonathan Stott, Ian W. Mars...