Sciweavers

2421 search results - page 143 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
91
Voted
OOPSLA
2009
Springer
15 years 7 months ago
Scalable nonblocking concurrent objects for mission critical code
The high degree of complexity and autonomy of future robotic space missions, such as Mars Science Laboratory (MSL), poses serious challenges in assuring their reliability and efï¬...
Damian Dechev, Bjarne Stroustrup
127
Voted
WCRE
2000
IEEE
15 years 5 months ago
Revisiting the Delta IC Approach to Component Recovery
Component recovery supports program understanding, architecture recovery, and re-use. Among the best known techniques for detection of re-usable objects (related global variables ...
Gerardo Canfora, Jörg Czeranski, Rainer Kosch...
134
Voted
ACSAC
2000
IEEE
15 years 5 months ago
History-based Distributed Filtering - A Tagging Approach to Network-Level Access Control
This contribution discusses a network-level access control technique that applies the non-discretionary access control model to individual data packets that are exchanged between ...
Reiner Sailer, M. Kabatnik
AAAI
1990
15 years 2 months ago
Backward Model Tracing: An Explanation-Based Approach for Reconstructing Student Reasoning
An original methodology, called backward model tracing to model student performance which features a profitable integration of the bug collection and bug construction techniques i...
Danilo Fum, Paolo Giangrandi, Carlo Tasso
116
Voted
FPGA
2010
ACM
182views FPGA» more  FPGA 2010»
14 years 10 months ago
A comprehensive approach to modeling, characterizing and optimizing for metastability in FPGAs
Metastability is a phenomenon that can cause system failures in digital circuits. It may occur whenever signals are being transmitted across asynchronous or unrelated clock domain...
Doris Chen, Deshanand Singh, Jeffrey Chromczak, Da...