Sciweavers

2145 search results - page 341 / 429
» Architectural Specifications in CASL
Sort
View
ICSE
2010
IEEE-ACM
13 years 12 months ago
Requirements reflection: requirements as runtime entities
Computational reflection is a well-established technique that gives a program the ability to dynamically observe and possibly modify its behaviour. To date, however, reflection is...
Nelly Bencomo, Jon Whittle, Peter Sawyer, Anthony ...
ISARCS
2010
156views Hardware» more  ISARCS 2010»
13 years 12 months ago
A Road to a Formally Verified General-Purpose Operating System
Methods of formal description and verification represent a viable way for achieving fundamentally bug-free software. However, in reality only a small subset of the existing operati...
Martin Decký
PODC
2010
ACM
13 years 12 months ago
Brief announcement: adaptive content placement for peer-to-peer video-on-demand systems
In this paper, we address the problem of content placement in peer-to-peer systems, with the objective of maximizing the utilization of peers' uplink bandwidth resources. We ...
Bo Tan, Laurent Massoulié
DRM
2008
Springer
13 years 11 months ago
A four-layer model for security of digital rights management
Defining Digital Rights Management (DRM) is a complex task. There is no unique universal definition. There are many legal, economic, functional, and technical definitions. This co...
Eric Diehl
ECAI
2008
Springer
13 years 11 months ago
An Empirical Investigation of the Adversarial Activity Model
Multiagent research provides an extensive literature on formal Belief-Desire-Intention (BDI) based models describing the notions of teamwork and cooperation, but adversarial and c...
Inon Zuckerman, Sarit Kraus, Jeffrey S. Rosenschei...