Sciweavers

11022 search results - page 1974 / 2205
» Programming Systems for Autonomy
Sort
View
ISCA
2005
IEEE
88views Hardware» more  ISCA 2005»
14 years 4 months ago
Architecture for Protecting Critical Secrets in Microprocessors
We propose “secret-protected (SP)” architecture to enable secure and convenient protection of critical secrets for a given user in an on-line environment. Keys are examples of...
Ruby B. Lee, Peter C. S. Kwan, John Patrick McGreg...
ISCA
2005
IEEE
101views Hardware» more  ISCA 2005»
14 years 4 months ago
Virtualizing Transactional Memory
Writing concurrent programs is difficult because of the complexity of ensuring proper synchronization. Conventional lock-based synchronization suffers from wellknown limitations, ...
Ravi Rajwar, Maurice Herlihy, Konrad K. Lai
KBSE
2005
IEEE
14 years 4 months ago
Properties and scopes in web model checking
We consider a formal framework for property verification of web applications using Spin model checker. Some of the web related properties concern all states of the model, while ot...
May Haydar, Sergiy Boroday, Alexandre Petrenko, Ho...
LICS
2005
IEEE
14 years 4 months ago
Model Checking Vs. Generalized Model Checking: Semantic Minimizations for Temporal Logics
Three-valued models, in which properties of a system are either true, false or unknown, have recently been advocated as a better representation for reactive program abstractions g...
Patrice Godefroid, Michael Huth
MMM
2005
Springer
115views Multimedia» more  MMM 2005»
14 years 4 months ago
Interoperability and Multimedia Archives
In distributed computing systems, it is unwise to move data to the point of program code, but instead process data at the point of storage. This concept is even more appropriate t...
Dalen Kambur, Damir Becarevic, Mark Roantree
« Prev « First page 1974 / 2205 Last » Next »