Sciweavers

3792 search results - page 709 / 759
» Techniques for Trusted Software Engineering
Sort
View
ICFEM
2004
Springer
15 years 5 months ago
Learning to Verify Safety Properties
We present a novel approach for verifying safety properties of finite state machines communicating over unbounded FIFO channels that is based on applying machine learning techniqu...
Abhay Vardhan, Koushik Sen, Mahesh Viswanathan, Gu...
114
Voted
ICSOC
2004
Springer
15 years 5 months ago
Methodological support for service-oriented design with ISDL
Currently, service-oriented computing is mainly technology-driven. Most developments focus on the technology that enables enterprises to describe, publish and compose application ...
Dick A. C. Quartel, Remco M. Dijkman, Marten van S...
94
Voted
DISCEX
2003
IEEE
15 years 5 months ago
Achieving Principled Assuredly Trustworthy Composable Systems and Networks
Huge challenges exist with systems and networks that must dependably satisfy stringent requirements for security, reliability, and other attributes of trustworthiness. Drawing on ...
Peter G. Neumann
106
Voted
IOLTS
2003
IEEE
133views Hardware» more  IOLTS 2003»
15 years 5 months ago
Power Consumption of Fault Tolerant Codes: the Active Elements
On-chip global interconnections in very deep submicron technology (VDSM) ICs are becoming more sensitive and prone to errors caused by power supply noise, crosstalk noise, delay v...
Daniele Rossi, Steven V. E. S. van Dijk, Richard P...
123
Voted
GROUP
2003
ACM
15 years 5 months ago
Awareness support in a groupware widget toolkit
Group awareness is an important part of synchronous collaboration, and support for group awareness can greatly improve groupware usability. However, it is still difficult to build...
Jason Hill, Carl Gutwin