Sciweavers

5863 search results - page 1093 / 1173
» On Model-Checking of P Systems
Sort
View
IFIP
2001
Springer
15 years 8 months ago
Security Documentation
Effective security management depends upon good risk management, which is itself based upon a reliable risk assessment, involving data collection of all the facets influencing sys...
Lam-for Kwok, Peggy P. K. Fung, Dennis Longley
HPDC
1999
IEEE
15 years 8 months ago
Process Hijacking
Process checkpointing is a basic mechanism required for providing High Throughput Computing service on distributively owned resources. We present a new process checkpoint and migr...
Victor C. Zandy, Barton P. Miller, Miron Livny
ICMCS
1999
IEEE
259views Multimedia» more  ICMCS 1999»
15 years 8 months ago
PhotoBuilder - 3D Models of Architectural Scenes from Uncalibrated Images
We address the problem of recovering 3D models from uncalibrated images of architectural scenes. We propose a simple, geometrically intuitive method which exploits the strong rigi...
Roberto Cipolla, Duncan P. Robertson, Edmond Boyer
ICSM
1999
IEEE
15 years 8 months ago
A Two-Phase Process for Software Architecture Improvement
Software architecture is important for large systems in which it is the main means for, among other things, controlling complexity. Current ideas on software architectures were no...
René L. Krikhaar, André Postma, M. P...
RTSS
1998
IEEE
15 years 8 months ago
Membership Questions for Timed and Hybrid Automata
Timed and hybrid automata are extensions of finite-state machines for formal modeling of embedded systems with both discrete and continuous components. Reachability problems for t...
Rajeev Alur, Robert P. Kurshan, Mahesh Viswanathan
« Prev « First page 1093 / 1173 Last » Next »