Sciweavers

1779 search results - page 322 / 356
» A Formal Model of Data Privacy
Sort
View
167
Voted
DATE
2004
IEEE
143views Hardware» more  DATE 2004»
15 years 7 months ago
Fault-Tolerant Deployment of Embedded Software for Cost-Sensitive Real-Time Feedback-Control Applications
Designing cost-sensitive real-time control systems for safetycritical applications requires a careful analysis of the cost/coverage trade-offs of fault-tolerant solutions. This fu...
Claudio Pinello, Luca P. Carloni, Alberto L. Sangi...
126
Voted
DAIS
2006
15 years 5 months ago
An Application Framework for Nomadic, Collaborative Applications
To maintain availability and responsiveness, mobile applications sharing data often work on their own copy and transmit local changes to other participants. Existing systems for re...
James O'Brien, Marc Shapiro
ICDE
2008
IEEE
130views Database» more  ICDE 2008»
16 years 5 months ago
Efficient Computation of Diverse Query Results
We study the problem of efficiently computing diverse query results in online shopping applications, where users specify queries through a form interface that allows a mix of stru...
Erik Vee, Utkarsh Srivastava, Jayavel Shanmugasund...
113
Voted
TASE
2008
IEEE
15 years 10 months ago
Verifying BPEL-Like Programs with Hoare Logic
The WS-BPEL language has recently become a de facto standard for modeling Web-based business processes. One of its essential features is the fully programmable compensation mechan...
Chenguang Luo, Shengchao Qin, Zongyan Qiu
124
Voted
KBSE
1998
IEEE
15 years 8 months ago
Planning Equational Verification in CCS
Most efforts to automate formal verification of communicating systems have centred around finite-state systems (FSSs). However, FSSs are incapable of modelling many practical comm...
Raul Monroy, Alan Bundy, Ian Green