Sciweavers

1028 search results - page 93 / 206
» Using Attack Graphs to Design Systems
Sort
View
DAC
2010
ACM
15 years 1 months ago
Electronic design automation for social networks
Online social networks are a growing internet phenomenon: they connect millions of individuals through sharing of common interests, political and religious views, careers, etc. So...
Andrew DeOrio, Valeria Bertacco
HIPEAC
2009
Springer
15 years 1 months ago
HeDGE: Hybrid Dataflow Graph Execution in the Issue Logic
Abstract. Exposing more instruction-level parallelism in out-of-order superscalar processors requires increasing the number of dynamic in-flight instructions. However, large instru...
Suriya Subramanian, Kathryn S. McKinley
ISSE
2011
14 years 4 months ago
Time-triggered buffers for event-based middleware systems
Application developers utilizing event-based middleware have sought to leverage domain-specific modeling for the advantages of intuitive specification, code synthesis, and suppo...
Jonathan Sprinkle, Brandon Eames
SPATIALCOGNITION
2004
Springer
15 years 3 months ago
Modelling Models of Robot Navigation Using Formal Spatial Ontology
Abstract. In this paper we apply a formal ontological framework in order to deconstruct two prominent approaches to navigation from cognitive robotics, the Spatial Semantic Hierarc...
John A. Bateman, Scott Farrar
HOTDEP
2008
157views Hardware» more  HOTDEP 2008»
15 years 3 days ago
Byzantium: Byzantine-Fault-Tolerant Database Replication Providing Snapshot Isolation
Database systems are a key component behind many of today's computer systems. As a consequence, it is crucial that database systems provide correct and continuous service des...
Nuno M. Preguiça, Rodrigo Rodrigues, Crist&...