Sciweavers

3038 search results - page 462 / 608
» Controlling Engineering Problem Solving
Sort
View
ICSE
2007
IEEE-ACM
14 years 9 months ago
Managing Impacts of Security Protocol Changes in Service-Oriented Applications
We present a software tool and a framework for security protocol change management. While we focus on trust negotiation protocols in this paper, many of the ideas are generally ap...
Halvard Skogsrud, Boualem Benatallah, Fabio Casati...
ICSE
2007
IEEE-ACM
14 years 9 months ago
The CRUTIAL Architecture for Critical Information Infrastructures
Abstract. In this chapter we discuss the susceptibility of critical information infrastructures to computer-borne attacks and faults, mainly due to their largely computerized natur...
Paulo Veríssimo, Nuno Ferreira Neves, Migue...
PPPJ
2009
ACM
14 years 4 months ago
Automatic parallelization for graphics processing units
Accelerated graphics cards, or Graphics Processing Units (GPUs), have become ubiquitous in recent years. On the right kinds of problems, GPUs greatly surpass CPUs in terms of raw ...
Alan Leung, Ondrej Lhoták, Ghulam Lashari
VMCAI
2009
Springer
14 years 4 months ago
Reducing Behavioural to Structural Properties of Programs with Procedures
Abstract There is an intimate link between program structure and behaviour. Exploiting this link to phrase program correctness problems in terms of the structural properties of a p...
Dilian Gurov, Marieke Huisman
KBSE
2009
IEEE
14 years 4 months ago
SMT-Based Bounded Model Checking for Embedded ANSI-C Software
Propositional bounded model checking has been applied successfully to verify embedded software but is limited by the increasing propositional formula size and the loss of structur...
Lucas Cordeiro, Bernd Fischer, João Marques...