Sciweavers

1023 search results - page 119 / 205
» Model Checking: Software and Beyond
Sort
View
ASPLOS
2006
ACM
15 years 10 months ago
Portability events: a programming model for scalable system infrastructures
Clustered Objects (COs) [1] have been proven to be an effective ion for improving scalability of systems software [2, 3]. But can we devise a programming model that would allow CO...
Chris Matthews, Yvonne Coady, Jonathan Appavoo
142
Voted
UML
1997
Springer
15 years 7 months ago
Evaluation of Object-Oriented Modelling Languages: A Comparison Between OML and UML
The following article is motivated by the current efforts of the Object Management Group (OMG) to standardize object-oriented modelling languages. In the face of the great economi...
Michael Prasse
CCR
2004
87views more  CCR 2004»
15 years 4 months ago
Non-stationarity and high-order scaling in TCP flow arrivals: a methodological analysis
The last decade has been a very fruitful period in important discoveries in network traffic modeling, uncovering various scaling behaviors. Self-similarity, long-range dependence,...
Steve Uhlig
EICS
2010
ACM
15 years 9 months ago
User interface plasticity: model driven engineering to the limit!
Ten years ago, I introduced the notion of user interface plasticity to denote the capacity of user interfaces to adapt, or to be adapted, to the context of use while preserving us...
Joëlle Coutaz
149
Voted
INFOSCALE
2007
ACM
15 years 5 months ago
A dubiety-determining based model for database cumulated anomaly intrusion
— The concept of Cumulated Anomaly (CA), which describes a new type of database anomalies, is addressed. A typical CA intrusion is that when a user who is authorized to modify da...
Gang Lu, Junkai Yi, Kevin Lü