Sciweavers

3555 search results - page 536 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
ICDE
2006
IEEE
130views Database» more  ICDE 2006»
16 years 5 months ago
Warehousing and Analyzing Massive RFID Data Sets
Radio Frequency Identification (RFID) applications are set to play an essential role in object tracking and supply chain management systems. In the near future, it is expected tha...
Hector Gonzalez, Jiawei Han, Xiaolei Li, Diego Kla...
ICAC
2009
IEEE
15 years 10 months ago
Applying adaptation design patterns
Dynamic adaptation may be used to prevent software downtime while new requirements and responses to environmental conditions are incorporated into the system. Previously, we studi...
Andres J. Ramirez, Betty H. C. Cheng
SAS
2001
Springer
121views Formal Methods» more  SAS 2001»
15 years 8 months ago
Embedding Chaos
Model checking would answer all finite-state verification problems, if it were not for the notorious state-space explosion problem. A problem of practical importance, which attra...
Natalia Sidorova, Martin Steffen
LCTRTS
2000
Springer
15 years 7 months ago
Reordering Memory Bus Transactions for Reduced Power Consumption
Low energy consumption is becoming the primary design consideration for battery-operated and portable embedded systems, such as personal digital assistants, digital still and movi...
Bruce R. Childers, Tarun Nakra
PLDI
2010
ACM
15 years 8 months ago
Bringing Extensibility to Verified Compilers
Verified compilers, such as Leroy's CompCert, are accompanied by a fully checked correctness proof. Both the compiler and proof are often constructed with an interactive proo...
Zachary Tatlock, Sorin Lerner