Sciweavers

4693 search results - page 794 / 939
» Verifying Hybrid Systems
Sort
View
SAC
2010
ACM
16 years 10 hour ago
Dual analysis for proving safety and finding bugs
Program bugs remain a major challenge for software developers and various tools have been proposed to help with their localization and elimination. Most present-day tools are base...
Corneliu Popeea, Wei-Ngan Chin
HICSS
2009
IEEE
111views Biometrics» more  HICSS 2009»
15 years 12 months ago
The Financial Impact of IT Governance Mechanisms' Adoption: An Empirical Analysis with Brazilian Firms
Recently, it appears on the agenda of many organizations the concept of IT governance in order to justify and mainly optimize IT investments. Some studies have shown that companie...
Guilherme Lerch Lunardi, João Luiz Becker, ...
FOSSACS
2009
Springer
15 years 12 months ago
Bisimulation for Demonic Schedulers
Bisimulation between processes has been proven a successful method for formalizing security properties. We argue that in certain cases, a scheduler that has full information on the...
Konstantinos Chatzikokolakis, Gethin Norman, David...
PAKDD
2009
ACM
135views Data Mining» more  PAKDD 2009»
15 years 12 months ago
On Mining Rating Dependencies in Online Collaborative Rating Networks
The trend of social information processing sees e-commerce and social web applications increasingly relying on user-generated content, such as rating, to determine the quality of o...
Hady Wirawan Lauw, Ee-Peng Lim, Ke Wang
CCGRID
2009
IEEE
15 years 12 months ago
Performance under Failures of DAG-based Parallel Computing
— As the scale and complexity of parallel systems continue to grow, failures become more and more an inevitable fact for solving large-scale applications. In this research, we pr...
Hui Jin, Xian-He Sun, Ziming Zheng, Zhiling Lan, B...