Sciweavers

3104 search results - page 487 / 621
» Using quantitative analysis to implement autonomic IT system...
Sort
View
145
Voted
ICCAD
1999
IEEE
125views Hardware» more  ICCAD 1999»
15 years 9 months ago
Direct synthesis of timed asynchronous circuits
This paper presents a new method to synthesize timed asynchronous circuits directly from the specification without generating a state graph. The synthesis procedure begins with a ...
Sung Tae Jung, Chris J. Myers
ICSE
2008
IEEE-ACM
16 years 4 months ago
Security protocols, properties, and their monitoring
This paper examines the suitability and use of runtime verification as means for monitoring security protocols and their properties. In particular, we employ the runtime verificat...
Andreas Bauer 0002, Jan Jürjens
MIDDLEWARE
2010
Springer
15 years 3 months ago
Anonygator: Privacy and Integrity Preserving Data Aggregation
Abstract. Data aggregation is a key aspect of many distributed applications, such as distributed sensing, performance monitoring, and distributed diagnostics. In such settings, use...
Krishna P. N. Puttaswamy, Ranjita Bhagwan, Venkata...
153
Voted
ICS
2010
Tsinghua U.
15 years 7 months ago
Clustering performance data efficiently at massive scales
Existing supercomputers have hundreds of thousands of processor cores, and future systems may have hundreds of millions. Developers need detailed performance measurements to tune ...
Todd Gamblin, Bronis R. de Supinski, Martin Schulz...
145
Voted
ESOP
2001
Springer
15 years 9 months ago
Typestate Checking of Machine Code
We check statically whether it is safe for untrusted foreign machine code to be loaded into a trusted host system. (Here “safety” means that the program abides by a memory-acc...
Zhichen Xu, Thomas W. Reps, Barton P. Miller