Sciweavers

14190 search results - page 2671 / 2838
» computing 2008
Sort
View
128
Voted
FOCS
2008
IEEE
15 years 10 months ago
k-Wise Independent Random Graphs
We study the k-wise independent relaxation of the usual model G(N, p) of random graphs where, as in this model, N labeled vertices are fixed and each edge is drawn with probabili...
Noga Alon, Asaf Nussboim
152
Voted
CONCUR
2008
Springer
15 years 5 months ago
A Notion of Glue Expressiveness for Component-Based Systems
Abstract. Comparison between different formalisms and models is often by flattening structure and reducing them to behaviorally equivalent models e.g., automaton and Turing machine...
Simon Bliudze, Joseph Sifakis
127
Voted
DAC
2008
ACM
15 years 5 months ago
SHIELD: a software hardware design methodology for security and reliability of MPSoCs
Security of MPSoCs is an emerging area of concern in embedded systems. Security is jeopardized by code injection attacks, which are the most common types of software attacks. Prev...
Krutartha Patel, Sri Parameswaran
GI
2008
Springer
15 years 4 months ago
Methoden formalisierter Kundenanforderungsanalyse
: Der Übergang von der Kundensystemspezifikation (als Bestandteil des Lastenhefts) zur Systemspezifikation (als Bestandteil des Pflichtenhefts) beinhaltet das Auffinden und Beseit...
Roland Kapeller
CIE
2008
Springer
15 years 5 months ago
Recursion on Nested Datatypes in Dependent Type Theory
Nested datatypes are families of datatypes that are indexed over all types and where the datatype constructors relate different members of the family. This may be used to represent...
Ralph Matthes
« Prev « First page 2671 / 2838 Last » Next »