Sciweavers

7839 search results - page 290 / 1568
» What's there and what's not
Sort
View
VAMOS
2007
Springer
15 years 7 months ago
Variability Models Must Not be Invariant!
Variability modeling techniques are used to specify variable aspects of members of a family of related software artifacts. Instances of variability models are then used to effici...
Elmar Jürgens, Markus Pizka
112
Voted
IPPS
2006
IEEE
15 years 7 months ago
Relationships between communication models in networks using atomic registers
A distributed system is commonly modelled by a graph where nodes represent processors and there is an edge between two processors if and only if they can communicate directly. In ...
Lisa Higham, Colette Johnen
HICSS
2005
IEEE
114views Biometrics» more  HICSS 2005»
15 years 7 months ago
Team Pattern Recognition: Sharing Cognitive Chunks Under Time Pressure
This study extends the theory of Recognition Primed Decision-Making by applying it to groups. Furthermore, we explore the application of Template Theory to collaboration. An exper...
Stephen C. Hayne, C. A. P. Smith, Leo R. Vijayasar...
TACAS
2004
Springer
107views Algorithms» more  TACAS 2004»
15 years 7 months ago
Decidable and Undecidable Problems in Schedulability Analysis Using Timed Automata
Abstract. We study schedulability problems of timed systems with nonuniformly recurring computation tasks. Assume a set of real time tasks whose best and worst execution times, and...
Pavel Krcál, Wang Yi
HOTOS
2003
IEEE
15 years 7 months ago
Certifying Program Execution with Secure Processors
Cerium is a trusted computing architecture that protects a program’s execution from being tampered while the program is running. Cerium uses a physically tamperresistant CPU and...
Benjie Chen, Robert Morris