Sciweavers

5344 search results - page 261 / 1069
» Privacy-Preserving Set Operations
Sort
View
144
Voted
ECBS
2007
IEEE
142views Hardware» more  ECBS 2007»
15 years 10 months ago
Model-Driven Engineering for Development-Time QoS Validation of Component-Based Software Systems
Model-driven engineering (MDE) techniques are increasingly being used to address many of the development and operational lifecycle concerns of large-scale component-based systems....
James H. Hill, Sumant Tambe, Aniruddha S. Gokhale
118
Voted
HICSS
2007
IEEE
125views Biometrics» more  HICSS 2007»
15 years 10 months ago
Stochastic Formal Methods: An Application to Accuracy of Numeric Software
— This paper provides a bound on the number of numeric operations (fixed or floating point) that can safely be performed before accuracy is lost. This work has important implic...
Marc Daumas, David Lester
124
Voted
SMC
2007
IEEE
105views Control Systems» more  SMC 2007»
15 years 10 months ago
A software architecture for adaptive modular sensing systems
Abstract—In this paper, a software architecture and knowledge representation scheme that enables the combination and reconfiguration of modular sensor and actuator components is...
Andrew C. Lyle, Michael D. Naish
117
Voted
ESOP
2007
Springer
15 years 10 months ago
Modular Shape Analysis for Dynamically Encapsulated Programs
We present a modular static analysis which identifies structural (shape) invariants for a subset of heap-manipulating programs. The subset is defined by means of a non-standard ...
Noam Rinetzky, Arnd Poetzsch-Heffter, Ganesan Rama...
FSEN
2007
Springer
15 years 10 months ago
Hoare Logic for ARM Machine Code
This paper shows how a machine-code Hoare logic is used to lift reasoning from the tedious operational model of a machine lana manageable level of abstraction without making simpli...
Magnus O. Myreen, Anthony C. J. Fox, Michael J. C....