Sciweavers

1270 search results - page 129 / 254
» IF Validation Environment Tutorial
Sort
View
KBSE
1998
IEEE
14 years 3 months ago
Towards the Automated Debugging and Maintenance of Logic-based Requirements Models
In this paper we describe a tools environment which automates the validation and maintenance of a requirements model written in many-sorted first order logic. We focus on: a trans...
T. L. McCluskey, Margaret Mary West
ISCOPE
1998
Springer
14 years 3 months ago
Dynamic Reconfiguration and Virtual Machine Management in the Harness Metacomputing System
Metacomputing frameworks have received renewed attention of late, fueled both by advances in hardware and networking, and by novel concepts such as computational grids. However the...
Mauro Migliardi, Jack Dongarra, Al Geist, Vaidy S....
ICDE
1993
IEEE
84views Database» more  ICDE 1993»
14 years 2 months ago
An Evaluation of Physical Disk I/Os for Complex Object Processing
In order to obtain the performance required for nonstandard database environments, we need suitable storage structures for complex objects. I n this paper we use an hierarchical c...
Wouter B. Teeuw, Christian Rich, Marc H. Scholl, H...
MM
1994
ACM
125views Multimedia» more  MM 1994»
14 years 2 months ago
Two-Dimensional Scaling Techniques for Adaptive, Rate-Based Transmission Control of Live Audio and Video Streams
: One of the major obstacles facing designers of video conferencing systems is the problem of ameliorating the effects of congestion on interconnected packet-switched networks that...
Terry Talley, Kevin Jeffay
HUC
2007
Springer
14 years 2 months ago
Amigo: Proximity-Based Authentication of Mobile Devices
Securing interactions between devices that do not know each other a priori is an important and challenging task. We present Amigo, a technique to authenticate co-located devices us...
Alex Varshavsky, Adin Scannell, Anthony LaMarca, E...