Sciweavers

1396 search results - page 185 / 280
» aim 2006
Sort
View
IV
2006
IEEE
149views Visualization» more  IV 2006»
15 years 6 months ago
Challenges in Visual Data Analysis
In today’s applications data is produced at unprecedented rates. While the capacity to collect and store new data rapidly grows, the ability to analyze these data volumes increa...
Daniel A. Keim, Florian Mansmann, Jörn Schnei...
LAWEB
2006
IEEE
15 years 6 months ago
Modeling and Composing Navigational Concerns in Web Applications. Requirements and Design Issues
Complex applications, in particular Web applications, deal with a myriad of different concerns and some of them affect several others. The result is that these crosscutting concer...
Silvia E. Gordillo, Gustavo Rossi, Ana Moreira, Jo...
83
Voted
LICS
2006
IEEE
15 years 6 months ago
Saturated Semantics for Reactive Systems
The semantics of process calculi has traditionally been specified by labelled transition systems (LTS), but with the development of name calculi it turned out that reaction rules...
Filippo Bonchi, Barbara König, Ugo Montanari
91
Voted
MEMOCODE
2006
IEEE
15 years 6 months ago
Specifying and proving properties of timed I/O automata in the TIOA toolkit
Timed I/O Automata (TIOA) is a mathematical framework for modeling and verification of distributed systems that involve discrete and continuous dynamics. TIOA can be used for exa...
Myla Archer, Hongping Lim, Nancy A. Lynch, Sayan M...
97
Voted
MICRO
2006
IEEE
114views Hardware» more  MICRO 2006»
15 years 6 months ago
Authentication Control Point and Its Implications For Secure Processor Design
Secure processor architecture enables tamper-proof protection on software that addresses many difficult security problems such as reverse-engineering prevention, trusted computing...
Weidong Shi, Hsien-Hsin S. Lee