Sciweavers

1938 search results - page 311 / 388
» Dependable Software
Sort
View
FOSSACS
2005
Springer
14 years 1 months ago
Expressivity of Coalgebraic Modal Logic: The Limits and Beyond
Modal logic has a good claim to being the logic of choice for describing the reactive behaviour of systems modeled as coalgebras. Logics with modal operators obtained from so-calle...
Lutz Schröder
CC
2004
Springer
14 years 1 months ago
Using Multiple Memory Access Instructions for Reducing Code Size
An important issue in embedded systems design is the size of programs. As computing devices decrease in size, yet with more and more functions, better code size optimizations are i...
Neil Johnson, Alan Mycroft
EMISA
2004
Springer
14 years 1 months ago
A Virtual Laboratory for IT Security Education
Abstract: Success of IT security not only depends on the evolution of technologies, but also relies on the knowledge of IT-Personnel and the level of their IT-security education. I...
Ji Hu, Dirk Cordel, Christoph Meinel
FC
2004
Springer
88views Cryptology» more  FC 2004»
14 years 1 months ago
Mental Models of Computer Security
Improved computer security requires improvements in risk communication to naive end users. Efficacy of risk communication depends not only on the nature of the risk, but also on t...
L. Jean Camp
ISPA
2004
Springer
14 years 1 months ago
Highly Reliable Linux HPC Clusters: Self-Awareness Approach
Abstract. Current solutions for fault-tolerance in HPC systems focus on dealing with the result of a failure. However, most are unable to handle runtime system configuration change...
Chokchai Leangsuksun, Tong Liu, Yudan Liu, Stephen...