Sciweavers

1042 search results - page 12 / 209
» Integrative Architecture Elicitation for Large Computer Base...
Sort
View
CCS
2011
ACM
12 years 7 months ago
VMCrypt: modular software architecture for scalable secure computation
Garbled circuits play a key role in secure computation. Unlike previous work, which focused mainly on efficiency and automation aspects of secure computation, in this paper we foc...
Lior Malka
MEDINFO
2007
193views Healthcare» more  MEDINFO 2007»
13 years 9 months ago
Another HISA - The New Standard: Health Informatics - Service Architecture
In addition to the meaning as Health Informatics Society of Australia, HISA is the acronym used for the new European Standard: Health Informatics – Service Architecture. This EN...
Gunnar O. Klein, Pier Angelo Sottile, Frederik End...
EDOC
2007
IEEE
14 years 2 months ago
Model-Driven Engineering for Requirements Analysis
Requirements engineering (RE) encompasses a set of activities for eliciting, modelling, agreeing, communicating and validating requirements that precisely define the problem doma...
Benoit Baudry, Clémentine Nebut, Yves Le Tr...
DAC
2005
ACM
14 years 8 months ago
Operator-based model-order reduction of linear periodically time-varying systems
eriodically time-varying (LPTV) abstractions are useful for a variety of communication and computer subsystems. In this paper, we present a novel operator-based model-order reduct...
Yayun Wan, Jaijeet S. Roychowdhury
DAC
1997
ACM
13 years 11 months ago
Formal Verification of FIRE: A Case Study
We present our experiences with the formal verification of an automotive chip used to control the safety features in a car. We used a BDD based model checker in our work. We descr...
Jae-Young Jang, Shaz Qadeer, Matt Kaufmann, Carl P...