Sciweavers

7835 search results - page 194 / 1567
» Software are Processes Too
Sort
View
CASSIS
2004
Springer
15 years 10 months ago
Modelling Mobility Aspects of Security Policies
Security policies are rules that constrain the behaviour of a system. Different, largely unrelated sets of rules typically govern the physical and logical worlds. However, increa...
Pieter H. Hartel, Pascal van Eck, Sandro Etalle, R...
ISCAS
2003
IEEE
116views Hardware» more  ISCAS 2003»
15 years 10 months ago
Using FPGAs to solve the Hamiltonian cycle problem
The Hamiltonian Cycle (HC) problem is an important graph problem with many applications. The general backtracking algorithm normally used for random graphs often takes far too lon...
Micaela Serra, Kenneth B. Kent
COMPSAC
2002
IEEE
15 years 10 months ago
A File Naming Scheme Using Hierarchical-Keywords
In this paper, we propose a file naming scheme, called HK (Hierarchical-Keyword-based) naming. In file systems, hierarchical naming has been used for these several decades. As t...
Harumasa Tada, Osamu Honda, Masahiro Higuchi
132
Voted
CC
2001
Springer
146views System Software» more  CC 2001»
15 years 9 months ago
Alias Analysis by Means of a Model Checker
We study the application of a standard model checker tool, Spin, to the well-known problem of computing a may-alias relation for a C program. A precise may-alias relation can signi...
Vincenzo Martena, Pierluigi San Pietro
IWPC
1999
IEEE
15 years 9 months ago
Understanding COBOL Systems using Inferred Types
In a typical COBOL program, the data division consists of 50% of the lines of code. Automatic type inference can help to understand the large collections of variable declarations ...
Arie van Deursen, Leon Moonen