Sciweavers

3008 search results - page 86 / 602
» Mechanisms for Importing Modules
Sort
View
CCS
2009
ACM
15 years 11 months ago
A practical property-based bootstrap architecture
Binary attestation, as proposed by the Trusted Computing Group (TCG), is a pragmatic approach for software integrity protection and verification. However, it has also various sho...
René Korthaus, Ahmad-Reza Sadeghi, Christia...
CAV
1998
Springer
103views Hardware» more  CAV 1998»
15 years 8 months ago
You Assume, We Guarantee: Methodology and Case Studies
Assume-guarantee reasoning has long been advertised as an important method for decomposing proof obligations in system veri cation. Re nement mappings (homomorphisms) have long bee...
Thomas A. Henzinger, Shaz Qadeer, Sriram K. Rajama...
CAE
2010
14 years 11 months ago
Interactive Volume Illustration Using Intensity Filtering
We propose a simple and interactive technique for volume illustration by using the difference between the original intensity values and a low-pass filtered copy. This difference, ...
Marc Ruiz, Imma Boada, Miquel Feixas, Mateu Sbert
SIGCSE
2010
ACM
187views Education» more  SIGCSE 2010»
15 years 9 months ago
Game-themed programming assignments for faculty: a case study
Despite the proven success of using computer video games as a context for teaching introductory programming (CS1/2) courses, barriers including the lack of adoptable materials, re...
Cinnamon Hillyard, Robin Angotti, Michael Panitz, ...
TASE
2012
IEEE
13 years 11 months ago
Discrete-Event Coordination Design for Distributed Agents
— This paper presents new results on the formal design of distributed coordinating agents in a discrete-event framework. In this framework, agents are modeled to be individually ...
Manh Tung Pham, Kiam Tian Seow