Sciweavers

15777 search results - page 2931 / 3156
» Software Engineering
Sort
View
ICFEM
2003
Springer
15 years 9 months ago
Formal Proof of a Polychronous Protocol for Loosely Time-Triggered Architectures
The verification of safety critical systems has become an area of increasing importance in computer science. The notion of reactive system has emerged to concentrate on problems r...
Mickaël Kerboeuf, David Nowak, Jean-Pierre Ta...
ICFEM
2003
Springer
15 years 9 months ago
Generic Interacting State Machines and Their Instantiation with Dynamic Features
Interacting State Machines (ISMs) are used to model reactive systems and to express and verify their properties. They can be seen both as automata exchanging messages simultaneousl...
David von Oheimb, Volkmar Lotz
EUROSYS
2010
ACM
15 years 9 months ago
NOVA: a microhypervisor-based secure virtualization architecture
The availability of virtualization features in modern CPUs has reinforced the trend of consolidating multiple guest operating systems on top of a hypervisor in order to improve pl...
Udo Steinberg, Bernhard Kauer
EUROSYS
2010
ACM
15 years 9 months ago
Policy-based access control for weakly consistent replication
Combining access control with weakly consistent replication presents a challenge if the resulting system is to support eventual consistency. If authorization policy can be tempora...
Ted Wobber, Thomas L. Rodeheffer, Douglas B. Terry
MSR
2010
ACM
15 years 9 months ago
Should I contribute to this discussion?
Abstract—Development mailing lists play a central role in facilitating communication in open source projects. Since these lists frequently host design and project discussions, kn...
Walid Ibrahim, Nicolas Bettenburg, Emad Shihab, Br...
« Prev « First page 2931 / 3156 Last » Next »