Sciweavers

3318 search results - page 161 / 664
» The Weak Instance Model
Sort
View
ICECCS
2009
IEEE
161views Hardware» more  ICECCS 2009»
15 years 11 months ago
Formal Modelling and Analysis of Business Information Applications with Fault Tolerant Middleware
Distributed information systems are critical to the functioning of many businesses; designing them to be dependable is a challenging but important task. We report our experience i...
Jeremy Bryans, John S. Fitzgerald, Alexander Roman...
153
Voted
HASE
2007
IEEE
15 years 10 months ago
Integrating Product-Line Fault Tree Analysis into AADL Models
Fault Tree Analysis (FTA) is a safety-analysis technique that has been recently extended to accommodate product-line engineering for critical domains. This paper describes a tool-...
Hongyu Sun, Miriam Hauptman, Robyn R. Lutz
ACMMSP
2006
ACM
250views Hardware» more  ACMMSP 2006»
15 years 10 months ago
What do high-level memory models mean for transactions?
Many people have proposed adding transactions, or atomic blocks, to type-safe high-level programming languages. However, researchers have not considered the semantics of transacti...
Dan Grossman, Jeremy Manson, William Pugh
ACSAC
2005
IEEE
15 years 10 months ago
Securing Email Archives through User Modeling
Online email archives are an under-protected yet extremely sensitive information resource. Email archives can store years worth of personal and business email in an easy-to-access...
Yiru Li, Anil Somayaji
WACV
2005
IEEE
15 years 10 months ago
Semi-Supervised Self-Training of Object Detection Models
The construction of appearance-based object detection systems is time-consuming and difficult because a large number of training examples must be collected and manually labeled i...
Chuck Rosenberg, Martial Hebert, Henry Schneiderma...