Sciweavers

519 search results - page 78 / 104
» Requirements, Implementation and Applications of Hand-held V...
Sort
View
ASE
2005
103views more  ASE 2005»
14 years 11 months ago
Component Verification with Automatically Generated Assumptions
Abstract. Model checking is an automated technique that can be used to determine whether a system satisfies certain required properties. The typical approach to verifying propertie...
Dimitra Giannakopoulou, Corina S. Pasareanu, Howar...
SICHERHEIT
2010
14 years 9 months ago
State Transfer for Hypervisor-Based Proactive Recovery of Heterogeneous Replicated Services
Intrusion-tolerant replication enables the construction of systems that tolerate a finite number of malicious faults. An arbitrary number of faults can be tolerated during system ...
Tobias Distler, Rüdiger Kapitza, Hans P. Reis...
HICSS
2005
IEEE
137views Biometrics» more  HICSS 2005»
15 years 5 months ago
Facilitating Human Collaboration with Agents
Ad hoc cross-agency teams are often needed to deal with actual, imminent, or potential crises that involve multiple geographic or political jurisdictions or require coordinated ex...
James E. Just, Mark R. Cornwell, Michael N. Huhns
141
Voted
ICCS
2007
Springer
15 years 3 months ago
Building Verifiable Sensing Applications Through Temporal Logic Specification
Abstract. Sensing is at the core of virtually every DDDAS application. Sensing applications typically involve distributed communication and coordination over large self-organized n...
Asad Awan, Ahmed H. Sameh, Suresh Jagannathan, Ana...
88
Voted
OSDI
1996
ACM
15 years 1 months ago
Automatic Compiler-Inserted I/O Prefetching for Out-of-Core Applications
Current operating systems offer poor performance when a numeric application's working set does not fit in main memory. As a result, programmers who wish to solve "out-of...
Todd C. Mowry, Angela K. Demke, Orran Krieger