Sciweavers

2652 search results - page 263 / 531
» Privacy-preserving linear programming
Sort
View
123
Voted
DATE
2004
IEEE
123views Hardware» more  DATE 2004»
15 years 7 months ago
On Concurrent Error Detection with Bounded Latency in FSMs
We discuss the problem of concurrent error detection (CED) with bounded latency in finite state machines (FSMs). The objective of this approach is to reduce the overhead of CED, a...
Sobeeh Almukhaizim, Petros Drineas, Yiorgos Makris
121
Voted
ECOOP
2006
Springer
15 years 7 months ago
Evolution of an Adaptive Middleware Exploiting Architectural Reflection
: Nowadays information systems are required to adapt themselves dynamically to the ever changing environment and requirements. Architectural reflection represents a principled mean...
Francesca Arcelli Fontana, Claudia Raibulet
105
Voted
IFIP
2000
Springer
15 years 7 months ago
PETSc and Overture: Lessons Learned Developing an Interface between Components
We consider two software packages that interact with each other as components: Overture and PETSc. An interface between these two packages could be of tremendous value to applicati...
Kristopher R. Buschelman, William Gropp, Lois C. M...
146
Voted
POS
2000
Springer
15 years 7 months ago
The Memory Behavior of the WWW, or The WWW Considered as a Persistent Store
Abstract. This paper presents the performance evaluation of five memory allocation strategies for the PerDiS Persistent Distributed Object store in the context of allocating two di...
Nicolas Richer, Marc Shapiro
130
Voted
AICOM
2010
127views more  AICOM 2010»
15 years 3 months ago
Interactive verification of concurrent systems using symbolic execution
This paper presents an interactive proof method for the verification of temporal properties of concurrent systems based on symbolic execution. Symbolic execution is a well known a...
Simon Bäumler, Michael Balser, Florian Nafz, ...