Sciweavers

5900 search results - page 91 / 1180
» Dependable Systems
Sort
View
RTSS
1999
IEEE
14 years 2 months ago
On the Use of Formal Techniques for Analyzing Dependable Real-Time Protocols
The e ective design of composite dependable and real-time protocols entails demonstrating their proof of correctness and, in practice, the e cient delivery of services. We focus o...
Purnendu Sinha, Neeraj Suri
EDBT
2011
ACM
231views Database» more  EDBT 2011»
13 years 1 months ago
Data integration with dependent sources
Data integration systems offer users a uniform interface to a set of data sources. Previous work has typically assumed that the data sources are independent of each other; however...
Anish Das Sarma, Xin Luna Dong, Alon Y. Halevy
SCAM
2008
IEEE
14 years 4 months ago
User-Input Dependence Analysis via Graph Reachability
Bug-checking tools have been used with some success in recent years to find bugs in software. For finding bugs that can cause security vulnerabilities, bug checking tools requir...
Bernhard Scholz, Chenyi Zhang, Cristina Cifuentes
DSN
2007
IEEE
14 years 2 months ago
Foundations of Measurement Theory Applied to the Evaluation of Dependability Attributes
Increasing interest is being paid to quantitative evaluation based on measurements of dependability attributes and metrics of computer systems and infrastructures. Despite measura...
Andrea Bondavalli, Andrea Ceccarelli, Lorenzo Fala...
IJCNN
2007
IEEE
14 years 4 months ago
Adaptive Dynamic Modularity in a Connectionist Model of Context-Dependent Idea Generation
Abstract— Cognitive control - the ability to produce appropriate behavior in complex situations - is a fundamental aspect of intelligence. It is increasingly evident that this co...
Simona Doboli, Ali A. Minai, Vincent R. Brown