Sciweavers

1658 search results - page 67 / 332
» Implementing Bit-addressing with Specialization
Sort
View
TSE
1998
93views more  TSE 1998»
13 years 8 months ago
Xception: A Technique for the Experimental Evaluation of Dependability in Modern Computers
An important step in the development of dependable systems is the validation of their fault tolerance properties. Fault injection has been widely used for this purpose, however wi...
Joao Carreira, Henrique Madeira, João Gabri...
SOPR
2002
106views more  SOPR 2002»
13 years 8 months ago
A discrete simulation model for assessing software project scheduling policies
Good project scheduling is an essential, but extremely hard task in software management practice. In a software project, the time needed to complete some development activity is d...
Frank Padberg
SP
2002
IEEE
129views Security Privacy» more  SP 2002»
13 years 8 months ago
The XCAT Science Portal
The design and prototype implementation of the XCAT Grid Science Portal is described in this paper. The portal lets grid application programmers easily script complex distributed ...
Sriram Krishnan, Randall Bramley, Dennis Gannon, R...
TELSYS
2002
126views more  TELSYS 2002»
13 years 8 months ago
Framework and Tool Support for Formal Verification of Highspeed Transfer Protocol Designs
Formal description techniques, verification methods, and their tool-based automated application meanwhile provide valuable support for the formal analysis of communication protocol...
Peter Herrmann, Heiko Krumm, Olaf Drögehorn, ...
ICFEM
2010
Springer
13 years 7 months ago
Automating Coinduction with Case Analysis
Abstract. Coinduction is a major technique employed to prove behavioral properties of systems, such as behavioral equivalence. Its automation is highly desirable, despite the fact ...
Eugen-Ioan Goriac, Dorel Lucanu, Grigore Rosu