Sciweavers

17789 search results - page 52 / 3558
» Exceptional Use Cases
Sort
View
DSD
2008
IEEE
147views Hardware» more  DSD 2008»
13 years 9 months ago
A Low-Cost Cache Coherence Verification Method for Snooping Systems
Due to modern technology trends such as decreasing feature sizes and lower voltage levels, fault tolerance is becoming increasingly important in computing systems. Shared memory i...
Demid Borodin, Ben H. H. Juurlink
ISSRE
2007
IEEE
13 years 9 months ago
Towards Self-Protecting Enterprise Applications
Enterprise systems must guarantee high availability and reliability to provide 24/7 services without interruptions and failures. Mechanisms for handling exceptional cases and impl...
Davide Lorenzoli, Leonardo Mariani, Mauro Pezz&egr...
DGO
2007
134views Education» more  DGO 2007»
13 years 9 months ago
Control patterns in a healthcare network
To keep a network of enterprises sustainable, inter-organizational control measures are needed to detect or prevent opportunistic behaviour of network participants. We present a m...
Vera Kartseva, Joris Hulstijn, Jaap Gordijn, Yao-H...
APN
2010
Springer
13 years 8 months ago
Forward Analysis for Petri Nets with Name Creation
Pure names are identifiers with no relation between them, except equality and inequality. In previous works we have extended P/T nets with the capability of creating and managing p...
Fernando Rosa Velardo, David de Frutos-Escrig
ECCC
2010
103views more  ECCC 2010»
13 years 7 months ago
Pseudorandom Generators for Regular Branching Programs
We give new pseudorandom generators for regular read-once branching programs of small width. A branching program is regular if the in-degree of every vertex in it is either 0 or 2...
Mark Braverman, Anup Rao, Ran Raz, Amir Yehudayoff