Sciweavers

1432 search results - page 96 / 287
» Executable Protocol Models as a Requirements Engineering Too...
Sort
View
135
Voted
CP
2008
Springer
15 years 5 months ago
A Constraint Programming Approach for Allocation and Scheduling on the CELL Broadband Engine
The Cell BE processor provides both scalable computation power and flexibility, and it is already being adopted for many computational intensive applications like aerospace, defens...
Luca Benini, Michele Lombardi, Michela Milano, Mar...
125
Voted
WCRE
2006
IEEE
15 years 9 months ago
Mining Control Flow Graphs for Crosscutting Concerns
Aspect mining tries to identify crosscutting concerns in existing systems and thus supports the adaption to an aspect-oriented design. This paper describes an automatic static asp...
Jens Krinke
CADE
2004
Springer
16 years 3 months ago
Attacking a Protocol for Group Key Agreement by Refuting Incorrect Inductive Conjectures
Abstract. Automated tools for finding attacks on flawed security protocols often struggle to deal with protocols for group key agreement. Systems designed for fixed 2 or 3 party pr...
Graham Steel, Alan Bundy, Monika Maidl
ASPLOS
2011
ACM
14 years 7 months ago
Sponge: portable stream programming on graphics engines
Graphics processing units (GPUs) provide a low cost platform for accelerating high performance computations. The introduction of new programming languages, such as CUDA and OpenCL...
Amir Hormati, Mehrzad Samadi, Mark Woh, Trevor N. ...
138
Voted
BPM
2006
Springer
150views Business» more  BPM 2006»
15 years 7 months ago
Towards a Methodology for Deriving Contract-Compliant Business Processes
Abstract. This paper presents a methodology for deriving business process descriptions based on terms in business contract. The aim is to assist process modellers in structuring co...
Zoran Milosevic, Shazia Wasim Sadiq, Maria E. Orlo...