Sciweavers

7429 search results - page 1421 / 1486
» Embedded System Update
Sort
View
CCS
2008
ACM
15 years 4 months ago
A security architecture for transient trust
In extraordinary situations, certain individuals may require access to information for which they are not normally authorized. For example, to facilitate rescue of people trapped ...
Cynthia E. Irvine, Timothy E. Levin, Paul C. Clark...
118
Voted
ECOOP
2008
Springer
15 years 4 months ago
A Unified Framework for Verification Techniques for Object Invariants
Verification of object-oriented programs relies on object invariants which express consistency criteria of objects. The semantics of object invariants is subtle, mainly because of...
Sophia Drossopoulou, Adrian Francalanza, Peter M&u...
127
Voted
ATMOS
2008
103views Optimization» more  ATMOS 2008»
15 years 4 months ago
IP-based Techniques for Delay Management with Priority Decisions
Delay management is an important issue in the daily operations of any railway company. The task is to update the planned timetable to a disposition timetable in such a way that the...
Michael Schachtebeck, Anita Schöbel
142
Voted
DAGSTUHL
2007
15 years 4 months ago
Logical Particle Filtering
Abstract. In this paper, we consider the problem of filtering in relational hidden Markov models. We present a compact representation for such models and an associated logical par...
Luke S. Zettlemoyer, Hanna M. Pasula, Leslie Pack ...
132
Voted
SIGSAND
2008
15 years 4 months ago
Reference Model for Service-oriented Business Software Based on Web Service Nets
Configurable business software solutions are increasingly being implemented based on service oriented architectures (SOA). Hereunto model driven approaches for the definition and i...
Maik Herfurth, Thomas Karle, Frank Schönthale...
« Prev « First page 1421 / 1486 Last » Next »