Sciweavers

3555 search results - page 559 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
HPCA
2012
IEEE
13 years 11 months ago
System-level implications of disaggregated memory
Recent research on memory disaggregation introduces a new architectural building block—the memory blade—as a cost-effective approach for memory capacity expansion and sharing ...
Kevin T. Lim, Yoshio Turner, Jose Renato Santos, A...
APCCM
2009
15 years 5 months ago
Conceptual Application Domain Modelling
Application domain description precedes requirements engineering, and is the basis for the development of a software or information system that satisfies all expectations of its u...
Bernhard Thalheim, Klaus-Dieter Schewe, Hui Ma
ASE
2002
160views more  ASE 2002»
15 years 3 months ago
Proving Invariants of I/O Automata with TAME
This paper describes a specialized interface to PVS called TAME (Timed Automata Modeling Environment) which provides automated support for proving properties of I/O automata. A maj...
Myla Archer, Constance L. Heitmeyer, Elvinia Ricco...
MVA
2000
164views Computer Vision» more  MVA 2000»
15 years 5 months ago
Visual Screen: Transforming an Ordinary Screen into a Touch Screen
Touch screens are very convenient because one can directly point to where it is interesting. This paper presents an inexpensive technique to transform an ordinary screen into a to...
Zhengyou Zhang, Ying Shan
ESOP
2001
Springer
15 years 8 months ago
Modeling an Algebraic Stepper
Programmers rely on the correctness of the tools in their programming environments. In the past, semanticists have studied the correctness of compilers and compiler analyses, which...
John Clements, Matthew Flatt, Matthias Felleisen