Sciweavers

5255 search results - page 219 / 1051
» Formal Methods for Privacy
Sort
View
146
Voted
DSN
2008
IEEE
15 years 5 months ago
Experiences with formal specification of fault-tolerant file systems
Fault-tolerant, replicated file systems are a crucial component of today's data centers. Despite their huge complexity, these systems are typically specified only in brief pr...
Roxana Geambasu, Andrew Birrell, John MacCormick
125
Voted
CORR
2010
Springer
178views Education» more  CORR 2010»
15 years 4 months ago
Formalization of the data flow diagram rules for consistency check
In system development life cycle (SDLC), a system model can be developed using Data Flow Diagram (DFD). DFD is graphical diagrams for specifying, constructing and visualizing the ...
Rosziati Ibrahim, Siow Yen yen
107
Voted
SPW
2005
Springer
15 years 9 months ago
Implementing a Multi-hat PDA
We describe our work in progress aimed at implementing a multi-hat PDA. Our current prototype is based on SELinux and KDE and accepts a proximity token, in the form of a Bluetooth ...
Matthew Johnson
SAFECOMP
2001
Springer
15 years 8 months ago
Project Experience with IEC 61508 and Its Consequences
The paper reports on the experiences with implementation of IEC 61508 in recent projects with European, North American and Japanese system vendors. The paper describes problems id...
Rainer Faller
163
Voted
OOPSLA
1991
Springer
15 years 7 months ago
Developing a GUIDE Using Object-Oriented Programming
PICASSOis a graphical user interface development environment built using the Common Lisp Object System (CLOS). This paper describes how CLOS features including multiple inheritanc...
Joseph A. Konstan, Lawrence A. Rowe