Sciweavers

6274 search results - page 872 / 1255
» Proofs, Programs, Processes
Sort
View
106
Voted
TOOLS
1997
IEEE
15 years 7 months ago
Mapping the OO-Jacobson Approach into Function Point Analysis
Function Point Analysis measures user requested functionality independent of the technology used for implementation. Software applications are represented stract model that contai...
T. Fetcke, A. Abran, T.-H. Nguyen
157
Voted
ESEC
1997
Springer
15 years 7 months ago
Verification of Liveness Properties Using Compositional Reachability Analysis
The software architecture of a distributed program can be represented by a hierarchical composition of subsystems, with interacting processes at the leaves of the hierarchy. Compo...
Shing-Chi Cheung, Dimitra Giannakopoulou, Jeff Kra...
119
Voted
IPPS
1994
IEEE
15 years 7 months ago
Building Multithreaded Architectures with Off-the-Shelf Microprocessors
Present-day parallel computers often face the problems of large software Overheadsfor process switching and interprocessor communication. These problems are addressed by the Multi...
Herbert H. J. Hum, Kevin B. Theobald, Guang R. Gao
110
Voted
CTRSA
2007
Springer
93views Cryptology» more  CTRSA 2007»
15 years 7 months ago
Human Identification Through Image Evaluation Using Secret Predicates
Abstract. The task of developing protocols for humans to securely authenticate themselves to a remote server has been an interesting topic in cryptography as a replacement for the ...
Hassan Jameel, Riaz Ahmed Shaikh, Heejo Lee, Sungy...
116
Voted
PODC
2010
ACM
15 years 7 months ago
Group mutual exclusion in O(log n) RMR
We present an algorithm to solve the GROUP MUTUAL EXCLUSION problem in the cache-coherent (CC) model. For the same problem in the distributed shared memory (DSM) model, Danek and ...
Vibhor Bhatt, Chien-Chung Huang