Sciweavers

3815 search results - page 125 / 763
» An Implementation of Session Types
Sort
View
SP
2006
IEEE
148views Security Privacy» more  SP 2006»
14 years 2 months ago
SubVirt: Implementing malware with virtual machines
Attackers and defenders of computer systems both strive to gain complete control over the system. To maximize their control, both attackers and defenders have migrated to low-leve...
Samuel T. King, Peter M. Chen, Yi-Min Wang, Chad V...
ACSC
2004
IEEE
13 years 12 months ago
Java Implementation Verification Using Reverse Engineering
An approach to system verification is described in which design artefacts produced during forward engineering are automatically compared to corresponding artefacts produced during...
David J. A. Cooper, Benjamin Khoo, Brian R. von Ko...
WOTUG
2008
13 years 9 months ago
Representation and Implementation of CSP and VCR Traces
Abstract. Communicating Sequential Processes (CSP) was developed around a formal algebra of processes and a semantics based on traces (and failures and divergences). A trace is a r...
Neil C. C. Brown, Marc L. Smith
ICMI
2009
Springer
106views Biometrics» more  ICMI 2009»
14 years 2 months ago
Towards adapting fantasy, curiosity and challenge in multimodal dialogue systems for preschoolers
We investigate how fantasy, curiosity and challenge contribute to the user experience in multimodal dialogue computer games for preschool children. For this purpose, an on-line mu...
Theofanis Kannetis, Alexandros Potamianos
DANCE
2002
IEEE
14 years 1 months ago
Design and Evaluation of a High Performance Dynamically Extensible Router
This paper describes the design, implementation and performance of an open, high performance, dynamically extensible router under development at Washington University in St. Louis...
Fred Kuhns, John D. DeHart, Anshul Kantawala, Ralp...