Sciweavers

851 search results - page 124 / 171
» Managing (Requirements) Evolutions of High Assurance Systems
Sort
View
EMISA
2009
Springer
15 years 4 months ago
A Thing Called "Fluid Process" - Beyond Rigidity in Business Process
: This keynote reports on a new class of processes - so called fluid processes - whose ”engineering” and ”use” is indistinguishable. Fluid processes are continually being ...
Manfred Reichert
JNW
2007
128views more  JNW 2007»
14 years 9 months ago
Store and Forward Applications in Telemedicine for Wireless IP Based Networks
— Telemedicine is the use of telecommunications technology to provide medical information and services. It may be as simple as two health professionals discussing a case over the...
Poondi Srinivasan Pandian, Kadavath Peedikayil Saf...
DSN
2008
IEEE
15 years 4 months ago
Tempest: Soft state replication in the service tier
Soft state in the middle tier is key to enabling scalable and responsive three tier service architectures. While softstate can be reconstructed upon failure, replicating it across...
Tudor Marian, Mahesh Balakrishnan, Ken Birman, Rob...
AINA
2007
IEEE
15 years 4 months ago
Heuristics for Improving Cryptographic Key Assignment in a Hierarchy
In hierarchical distributed systems, shared data access can be controlled by assigning user groups single cryptographic keys that allow high level users derive low level keys, but...
Anne V. D. M. Kayem, Patrick Martin, Selim G. Akl
ECBS
2003
IEEE
145views Hardware» more  ECBS 2003»
15 years 3 months ago
Model Checking and Evidence Exploration
We present an algebraic framework for evidence exploration: the process of interpreting, manipulating, and navigating the proof structure or evidence produced by a model checker w...
Yifei Dong, C. R. Ramakrishnan, Scott A. Smolka