Sciweavers

2702 search results - page 213 / 541
» Practically Applicable Formal Methods
Sort
View
ICDE
2007
IEEE
198views Database» more  ICDE 2007»
16 years 11 days ago
Worst-Case Background Knowledge for Privacy-Preserving Data Publishing
Recent work has shown the necessity of considering an attacker's background knowledge when reasoning about privacy in data publishing. However, in practice, the data publishe...
David J. Martin, Daniel Kifer, Ashwin Machanavajjh...
CAV
2009
Springer
176views Hardware» more  CAV 2009»
15 years 11 months ago
PAT: Towards Flexible Verification under Fairness
Recent development on distributed systems has shown that a variety of fairness constraints (some of which are only recently defined) play vital roles in designing self-stabilizing ...
Jun Sun 0001, Yang Liu 0003, Jin Song Dong, Jun Pa...
CHI
2007
ACM
15 years 11 months ago
Software design and engineering as a social process
Traditionally, software engineering processes are based on a formalist model that emphasizes strict documentation, procedural and validation standards. Although this is a poor fit...
William A. Stubblefield, Tania L. Carson
CAV
2009
Springer
168views Hardware» more  CAV 2009»
15 years 5 months ago
Games through Nested Fixpoints
In this paper we consider two-player zero-sum payoff games on finite graphs, both in the deterministic as well as in the stochastic setting. In the deterministic setting, we consi...
Thomas Gawlitza, Helmut Seidl
MEMOCODE
2006
IEEE
15 years 5 months ago
802.11a transmitter: a case study in microarchitectural exploration
Hand-held devices have rigid constraints regarding power dissipation and energy consumption. Whether a new functionality can be supported often depends upon its power requirements...
Nirav Dave, Michael Pellauer, S. Gerding, Arvind