Sciweavers

1285 search results - page 223 / 257
» Information systems revisited - the general continuous case
Sort
View
ICDE
2008
IEEE
141views Database» more  ICDE 2008»
15 years 8 months ago
Provenance-aware secure networks
Network accountability and forensic analysis have become increasingly important, as a means of performing network diagnostics, identifying malicious nodes, enforcing trust managem...
Wenchao Zhou, Eric Cronin, Boon Thau Loo
RTAS
2008
IEEE
15 years 8 months ago
Optimizing the Implementation of Communication in Synchronous Reactive Models
A fundamental asset of a model-based development process is the capability of providing an automatic implementation of the model that preserves its semantics and, at the same time...
Marco Di Natale, Guoqiang Wang, Alberto L. Sangiov...
GECCO
2007
Springer
163views Optimization» more  GECCO 2007»
15 years 8 months ago
Action-selection and crossover strategies for self-modeling machines
In previous work [7] a computational framework was demonstrated that employs evolutionary algorithms to automatically model a given system. This is accomplished by alternating the...
Josh C. Bongard
STORAGESS
2006
ACM
15 years 8 months ago
Limiting trust in the storage stack
We propose a framework for examining trust in the storage stack based on different levels of trustworthiness present across different channels of information flow. We focus on ...
Lakshmi N. Bairavasundaram, Meenali Rungta, Andrea...
123
Voted
SOFTVIS
2005
ACM
15 years 7 months ago
CVSscan: visualization of code evolution
During the life cycle of a software system, the source code is changed many times. We study how developers can be enabled to get insight in these changes, in order to understand t...
Lucian Voinea, Alexandru Telea, Jarke J. van Wijk