Sciweavers

103 search results - page 5 / 21
» A Contract-based Approach to Designing Safe Systems
Sort
View
VLDB
2012
ACM
360views Database» more  VLDB 2012»
12 years 3 months ago
An adaptive updating protocol for reducing moving object database workload
In the last decade, spatio-temporal database research focuses on the design of effective and efficient indexing structures in support of location-based queries such as predictive...
Su Chen, Beng Chin Ooi, Zhenjie Zhang
EDCC
1994
Springer
13 years 11 months ago
Designing Secure and Reliable Applications using Fragmentation-Redundancy-Scattering: An Object-Oriented Approach
Security and reliability issues in distributed systems have been investigated for several years at LAAS using a technique called Fragmentation-Redundancy-Scattering (FRS). The aim ...
Jean-Charles Fabre, Yves Deswarte, Brian Randell
SAFECOMP
1998
Springer
13 years 12 months ago
Increasing System Safety for By-Wire Applications in Vehicles by Using a Time Triggered Architecture
By-wire systems have been established for several years in the area of aircraft construction and there are now approaches to utilize this technology in vehicles. The required elect...
Thomas Ringler, J. Steiner, R. Belschner, Bernd He...
ICSE
2000
IEEE-ACM
13 years 11 months ago
Automated refactoring to introduce design patterns
Software systems have to be flexible in order to cope with evolving requirements. However, since it is impossible to predict with certainty what future requirements will emerge, i...
Mel Ó Cinnéide
FORTE
2011
12 years 11 months ago
Analyzing BGP Instances in Maude
Analyzing Border Gateway Protocol (BGP) instances is a crucial step in the design and implementation of safe BGP systems. Today, the analysis is a manual and tedious process. Resea...
Anduo Wang, Carolyn L. Talcott, Limin Jia, Boon Th...