Sciweavers

1304 search results - page 112 / 261
» Model Checking C Programs Using F-SOFT
Sort
View
HICSS
2002
IEEE
109views Biometrics» more  HICSS 2002»
15 years 8 months ago
Monitoring Software Requirements Using Instrumented Code
Ideally, software is derived from requirements whose properties have been established as good. However, it is difficult to define and analyze requirements. Moreover, derivation of...
William N. Robinson
PLDI
2009
ACM
15 years 9 months ago
Parallelizing sequential applications on commodity hardware using a low-cost software transactional memory
Multicore designs have emerged as the mainstream design paradigm for the microprocessor industry. Unfortunately, providing multiple cores does not directly translate into performa...
Mojtaba Mehrara, Jeff Hao, Po-Chun Hsu, Scott A. M...
IIE
2007
75views more  IIE 2007»
15 years 2 months ago
Program and Evaluation Planning Light: Planning in the Real World
Although there are many high-quality models for program and evaluation planning, these models are often too intensive to be used in situations when time and resources are scarce. A...
Justus J. Randolph, Pasi J. Eronen
ESOP
2005
Springer
15 years 8 months ago
Programming with Explicit Security Policies
Are computing systems trustworthy? To answer this, we need to know three things: what the systems are supposed to do, what they are not supposed to do, and what they actually do. A...
Andrew C. Myers
BIS
2008
119views Business» more  BIS 2008»
15 years 4 months ago
Influence Factors of Understanding Business Process Models
The increasing utilization of business process models both in business analysis and information systems development raises several issues regarding quality measures. In this contex...
Jan Mendling, Mark Strembeck