Sciweavers

2513 search results - page 311 / 503
» Tamper-Tolerant Software: Modeling and Implementation
Sort
View
86
Voted
LCTRTS
2004
Springer
15 years 6 months ago
Flattening statecharts without explosions
We present a polynomial upper bound for flattening of UML statecharts. An efficient flattening technique is derived and implemented in SCOPE—a code generator targeting constra...
Andrzej Wasowski
111
Voted
IPPS
2010
IEEE
14 years 10 months ago
Acceleration of spiking neural networks in emerging multi-core and GPU architectures
Recently, there has been strong interest in large-scale simulations of biological spiking neural networks (SNN) to model the human brain mechanisms and capture its inference capabi...
Mohammad A. Bhuiyan, Vivek K. Pallipuram, Melissa ...
ICSE
2008
IEEE-ACM
16 years 25 days ago
Security protocols, properties, and their monitoring
This paper examines the suitability and use of runtime verification as means for monitoring security protocols and their properties. In particular, we employ the runtime verificat...
Andreas Bauer 0002, Jan Jürjens
111
Voted
ICSE
2004
IEEE-ACM
16 years 25 days ago
A Hybrid Architectural Style for Distributed Parallel Processing of Generic Data Streams
Immersive, interactive applications grouped under the concept of Immersipresence require on-line processing and mixing of multimedia data streams and structures. One critical issu...
Alexandre R. J. François
141
Voted
AOSD
2006
ACM
15 years 6 months ago
Relationship aspects
The relationships between objects in object-oriented programs are as important as the objects themselves. Unfortunately, most objectoriented programming languages provide little s...
David J. Pearce, James Noble