Sciweavers

753 search results - page 99 / 151
» Fragments-based Model Reduction: Some Case Studies
Sort
View
ECMDAFA
2008
Springer
118views Hardware» more  ECMDAFA 2008»
13 years 8 months ago
A Metamodeling Approach for Reasoning about Requirements
In requirements engineering, there are several approaches for requirements modeling such as goal-oriented, aspect-driven, and system requirements modeling. In practice, companies o...
Arda Goknil, Ivan Kurtev, Klaas van den Berg
JWSR
2008
98views more  JWSR 2008»
13 years 7 months ago
Mining and Improving Composite Web Services Recovery Mechanisms
: Ensuring composite services reliability is a challenging problem. Indeed, due to the inherent autonomy and heterogeneity of Web services it is difficult to predict and reason abo...
Sami Bhiri, Walid Gaaloul, Claude Godart
SQJ
2010
152views more  SQJ 2010»
13 years 6 months ago
Design pattern evolutions in QVT
One of the main goals of design patterns is to design for change. Many design patterns leave some room for future changes and evolutions. The application of design patterns leads ...
Jing Dong, Yajing Zhao, Yongtao Sun
HPCA
2005
IEEE
14 years 8 months ago
Predicting Inter-Thread Cache Contention on a Chip Multi-Processor Architecture
This paper studies the impact of L2 cache sharing on threads that simultaneously share the cache, on a Chip Multi-Processor (CMP) architecture. Cache sharing impacts threads non-u...
Dhruba Chandra, Fei Guo, Seongbeom Kim, Yan Solihi...
ACNS
2005
Springer
94views Cryptology» more  ACNS 2005»
14 years 1 months ago
Optimal Asymmetric Encryption and Signature Paddings
Strong security notions often introduce strong constraints on the construction of cryptographic schemes: semantic security implies probabilistic encryption, while the resistance to...
Benoît Chevallier-Mames, Duong Hieu Phan, Da...