Sciweavers

2520 search results - page 303 / 504
» Model-checking behavioral programs
Sort
View
124
Voted
SAC
2010
ACM
15 years 9 months ago
Extraction of component-environment interaction model using state space traversal
Scalability of software engineering methods can be improved by application of the methods to individual components instead of complete systems. This is, however, possible only if ...
Pavel Parizek, Nodir Yuldashev
130
Voted
SP
2009
IEEE
143views Security Privacy» more  SP 2009»
15 years 9 months ago
Practical Mitigations for Timing-Based Side-Channel Attacks on Modern x86 Processors
—This paper studies and evaluates the extent to which automated compiler techniques can defend against timing-based side-channel attacks on modern x86 processors. We study how mo...
Bart Coppens, Ingrid Verbauwhede, Koen De Bosscher...
121
Voted
ICNS
2009
IEEE
15 years 9 months ago
Proactive Future Internet: Smart Semantic Middleware for Overlay Architecture
Some initiatives towards Future Internet, e.g., GENI, DARPA’s Active Networks, argue the need for programmability of the network components. Some other initiatives extend this w...
Vagan Y. Terziyan, Dmytro Zhovtobryukh, Artem Kata...
130
Voted
HICSS
2007
IEEE
110views Biometrics» more  HICSS 2007»
15 years 9 months ago
Paper versus Electronic: Challenges Associated with Physicians' Usage of Electronic Medical Records
This study builds on the theory of planned behavior, institutional and diffusion theories to investigate physicians’ attitudes and usage behaviors of electronic medical records ...
Virginia Ilie, James F. Courtney, Craig Van Slyke
CP
2007
Springer
15 years 8 months ago
Model-Driven Visualizations of Constraint-Based Local Search
Visualization is often invaluable to understand the behavior of optimization algorithms, identify their bottlenecks or pathological behaviors, and suggest remedial techniques. Yet ...
Grégoire Dooms, Pascal Van Hentenryck, Laur...