Sciweavers

108 search results - page 12 / 22
» Enforcing structural regularities in software using IntensiV...
Sort
View
JGAA
2007
124views more  JGAA 2007»
13 years 7 months ago
Energy Models for Graph Clustering
The cluster structure of many real-world graphs is of great interest, as the clusters may correspond e.g. to communities in social networks or to cohesive modules in software syst...
Andreas Noack
CSFW
2004
IEEE
13 years 11 months ago
Owned Policies for Information Security
In many systems, items of information have owners associated with them. An owner of an item of information may want the system to enforce a policy that restricts use of that infor...
Hubie Chen, Stephen Chong
SCA
2007
13 years 10 months ago
Liquid simulation on lattice-based tetrahedral meshes
We describe a method for animating incompressible liquids with detailed free surfaces. For each time step, semiLagrangian contouring computes a new fluid boundary (represented as ...
Nuttapong Chentanez, Bryan E. Feldman, Franç...
ETFA
2008
IEEE
14 years 2 months ago
Component based colored Petri net model for Ethernet based networked control systems
This paper presents a novel colored Petri net model for the simulation of fully-switched Ethernet based networked control systems (NCS). The model of the NCS is built from models ...
Abouelabbas Ghanaim, Georg Frey
ACMMSP
2006
ACM
278views Hardware» more  ACMMSP 2006»
14 years 1 months ago
Atomicity via source-to-source translation
We present an implementation and evaluation of atomicity (also known as software transactions) for a dialect of Java. Our implementation is fundamentally different from prior work...
Benjamin Hindman, Dan Grossman