Sciweavers

2429 search results - page 366 / 486
» Using Aspects to Design a Secure System
Sort
View
DATE
2002
IEEE
95views Hardware» more  DATE 2002»
15 years 2 months ago
Window-Based Susceptance Models for Large-Scale RLC Circuit Analyses
Due to the increasing operating frequencies and the manner in which the corresponding integrated circuits and systems must be designed, the extraction, modeling and simulation of ...
Hui Zheng, Lawrence T. Pileggi, Michael W. Beattie...
TOOLS
2000
IEEE
15 years 2 months ago
Generic Components to Foster Reuse
Software reuse and especially the paradigm of software components are promising approaches to increase the efficiency of software development. One of the basic problems of softwar...
Lothar Baum, Martin Becker
AUTONOMICS
2007
ACM
15 years 2 months ago
A framework to support multiple reconfiguration strategies
Self-management is a key feature of autonomic systems. This often demands the dynamic reconfiguration of a distributed application. An important issue in the reconfiguration proce...
Liliana Rosa, Luís Rodrigues, Antóni...
AIM
2004
14 years 9 months ago
Qualitative Spatial Reasoning Extracting and Reasoning with Spatial Aggregates
Reasoning about spatial data is a key task in many applications, including geographic information systems, meteorological and fluid flow analysis, computer-aided design, and prote...
Christopher Bailey-Kellogg, Feng Zhao
CCR
2004
151views more  CCR 2004»
14 years 9 months ago
Practical verification techniques for wide-area routing
Protocol and system designers use verification techniques to analyze a system's correctness properties. Network operators need verification techniques to ensure the "cor...
Nick Feamster