Sciweavers

1446 search results - page 127 / 290
» Formal analysis of hardware requirements
Sort
View
IEEEPACT
2005
IEEE
14 years 4 months ago
Memory State Compressors for Giga-Scale Checkpoint/Restore
We propose a checkpoint store compression method for coarse-grain giga-scale checkpoint/restore. This mechanism can be useful for debugging, post-mortem analysis and error recover...
Andreas Moshovos, Alexandros Kostopoulos
ATVA
2004
Springer
135views Hardware» more  ATVA 2004»
14 years 4 months ago
Using Block-Local Atomicity to Detect Stale-Value Concurrency Errors
Data races do not cover all kinds of concurrency errors. This paper presents a data-ow-based technique to nd stale-value errors, which are not found by low-level and high-level d...
Cyrille Artho, Klaus Havelund, Armin Biere
HICSS
2008
IEEE
130views Biometrics» more  HICSS 2008»
14 years 5 months ago
Enterprise Modeling for Information System Development within MDA
Object-oriented analysis suggests semiformal usecase driven techniques for problem domain modeling from a computation independent viewpoint. The proposed approach called Topologic...
Janis Osis, Erika Asnina
AOSE
2007
Springer
14 years 5 months ago
A Goal-Oriented Software Testing Methodology
Abstract. Agent-Oriented Software Engineering (AOSE) methodologies are proposed to develop complex distributed systems based upon the agent paradigm. The natural implementation for...
Duy Cu Nguyen, Anna Perini, Paolo Tonella
ESORICS
2007
Springer
14 years 5 months ago
A Policy Language for Distributed Usage Control
We present the Obligation Specification Language (OSL), a policy language for distributed usage control. OSL supports the formalization of a wide range of usage control requiremen...
Manuel Hilty, Alexander Pretschner, David A. Basin...