Sciweavers

781 search results - page 98 / 157
» An Integrated Model for Hybrid Securities
Sort
View
ICCAD
2010
IEEE
186views Hardware» more  ICCAD 2010»
13 years 6 months ago
Efficient state space exploration: Interleaving stateless and state-based model checking
State-based model checking methods comprise computing and storing reachable states, while stateless model checking methods directly reason about reachable paths using decision proc...
Malay K. Ganai, Chao Wang, Weihong Li
COSIT
2009
Springer
141views GIS» more  COSIT 2009»
14 years 3 months ago
A Conceptual Model of the Cognitive Processing of Environmental Distance Information
Abstract. I review theories and research on the cognitive processing of environmental distance information by humans, particularly that acquired via direct experience in the enviro...
Daniel R. Montello
IPPS
2010
IEEE
13 years 6 months ago
A PRAM-NUMA model of computation for addressing low-TLP workloads
It is possible to implement the parallel random access machine (PRAM) on a chip multiprocessor (CMP) efficiently with an emulated shared memory (ESM) architecture to gain easy par...
Martti Forsell
STORAGESS
2006
ACM
14 years 2 months ago
Long-term threats to secure archives
Archival storage systems are designed for a write-once, read-maybe usage model which places an emphasis on the long-term preservation of their data contents. In contrast to tradit...
Mark W. Storer, Kevin M. Greenan, Ethan L. Miller
SIGSOFT
2002
ACM
14 years 9 months ago
Secure systems development based on the common criteria: the PalME project
Security is a very important issue in information processing, especially in open network environments like the Internet. The Common Criteria (CC) is the standard requirements cata...
Monika Vetterling, Guido Wimmel, Alexander K. Wi&s...