Sciweavers

464 search results - page 88 / 93
» Privacy Engineering for Digital Rights Management Systems
Sort
View
CAISE
2000
Springer
13 years 11 months ago
An Overview of RoZ: A Tool for Integrating UML and Z Specifications
This paper presents an approach and a tool to increase specification quality by using a combination of UML and formal languages. Our approach is based on the expression of the UML ...
Sophie Dupuy, Yves Ledru, Monique Chabre-Peccoud
OOPSLA
2007
Springer
14 years 1 months ago
Statistically rigorous java performance evaluation
Java performance is far from being trivial to benchmark because it is affected by various factors such as the Java application, its input, the virtual machine, the garbage collect...
Andy Georges, Dries Buytaert, Lieven Eeckhout
ISSTA
2006
ACM
14 years 1 months ago
Application of automated environment generation to commercial software
Model checking can be an effective technique for detecting concurrency-related errors in software systems. However, due to scalability issues, to handle industrial-strength softw...
Oksana Tkachuk, Sreeranga P. Rajan
EUROSYS
2007
ACM
14 years 4 months ago
Competitive prefetching for concurrent sequential I/O
During concurrent I/O workloads, sequential access to one I/O stream can be interrupted by accesses to other streams in the system. Frequent switching between multiple sequential ...
Chuanpeng Li, Kai Shen, Athanasios E. Papathanasio...
SACMAT
2006
ACM
14 years 1 months ago
The secondary and approximate authorization model and its application to Bell-LaPadula policies
We introduce the concept, model, and policy-specific algorithms for inferring new access control decisions from previous ones. Our secondary and approximate authorization model (...
Jason Crampton, Wing Leung, Konstantin Beznosov