Sciweavers

392 search results - page 34 / 79
» Privacy Requirement Modeling and Verification in Cloud Compu...
Sort
View
87
Voted
DAC
2005
ACM
16 years 1 months ago
Trace-driven HW/SW cosimulation using virtual synchronization technique
Poor performance of HW/SW cosimulation is mainly caused by synchronization requirement between component simulators. Virtual synchronization technique was proposed to remove the n...
Dohyung Kim, Youngmin Yi, Soonhoi Ha
138
Voted
FORTE
1994
15 years 1 months ago
An improvement in formal verification
Critical safety and liveness properties of a concurrent system can often be proven with the help of a reachability analysis of a finite state model. This type of analysis is usual...
Gerard J. Holzmann, Doron Peled
121
Voted
EUROPAR
2009
Springer
15 years 4 months ago
MyriXen: Message Passing in Xen Virtual Machines over Myrinet and Ethernet
Data access in HPC infrastructures is realized via user-level networking and OS-bypass techniques through which nodes can communicate with high bandwidth and low-latency. Virtualiz...
Anastassios Nanos, Nectarios Koziris
100
Voted
TISSEC
2010
121views more  TISSEC 2010»
14 years 10 months ago
Privacy-aware role-based access control
Privacy has been acknowledged to be a critical requirement for many business (and non-business) environments. Therefore, the definition of an expressive and easy-to-use privacyre...
Qun Ni, Elisa Bertino, Jorge Lobo, Carolyn Brodie,...
106
Voted
ISSTA
2010
ACM
15 years 2 months ago
Analysis of invariants for efficient bounded verification
SAT-based bounded verification of annotated code consists of translating the code together with the annotations to a propositional formula, and analyzing the formula for specifica...
Juan P. Galeotti, Nicolás Rosner, Carlos L&...