Sciweavers

1299 search results - page 125 / 260
» On the Correctness of Operating System Kernels
Sort
View
CCS
2008
ACM
15 years 6 months ago
A security architecture for transient trust
In extraordinary situations, certain individuals may require access to information for which they are not normally authorized. For example, to facilitate rescue of people trapped ...
Cynthia E. Irvine, Timothy E. Levin, Paul C. Clark...
157
Voted
SRDS
2000
IEEE
15 years 9 months ago
Semantically Reliable Multicast Protocols
Reliable multicast protocols can strongly simplify the design of distributed applications. However, it is hard to sustain a high multicast throughput when groups are large and het...
José Orlando Pereira, Rui Carlos Oliveira, ...
ENTCS
2006
100views more  ENTCS 2006»
15 years 4 months ago
Typed Mobile Ambients in Maude
Maude has revealed itself as a powerful tool for implementing different kinds of semantics so that quick prototypes are available for trying examples and proving properties. In th...
Fernando Rosa Velardo, Clara Segura, Alberto Verde...
WADT
2001
Springer
15 years 9 months ago
Verifying a Simple Pipelined Microprocessor Using Maude
Abstract. We consider the verification of a simple pipelined microprocessor in Maude, by implementing an equational theoretical model of systems. Maude is an equationally-based la...
Neal A. Harman
139
Voted
CASCON
1996
151views Education» more  CASCON 1996»
15 years 6 months ago
Performance aspects of dynamic re-allocation for partitioned data
The correct and ecient management of data in distributed databases or mobile computing environments is dicult. Communication disruptions within such systems render the execution o...
Paul A. Jensen, Monica Brockmeyer, Nandit Soparkar