Sciweavers

1949 search results - page 24 / 390
» Protective Interface Specifications
Sort
View
AVI
2000
13 years 9 months ago
Generating User Interface Code in a Model Based User Interface Development Environment
Declarative models play an important role in most software design activities, by allowing designs to be constructed that selectively abstract over complex implementation details. ...
Paulo Pinheiro da Silva, Tony Griffiths, Norman W....
GI
2003
Springer
14 years 23 days ago
Strategic Simulation Games to foster Policy Development for Critical Infrastructure Protection
: Strategic Simulation Games have become an important element of policy development in the context of Critical Infrastructure Protection (CIP). They foster the network between all ...
Matthias Holenstein, Daniel Bircher
CBSE
2008
Springer
13 years 9 months ago
State Space Reduction Techniques for Component Interfaces
Abstract. Automata-based interface and protocol specifications provide an elegant framework to capture and automatically verify the interactive behavior of component-based software...
Markus Lumpe, Lars Grunske, Jean-Guy Schneider
MSS
2007
IEEE
100views Hardware» more  MSS 2007»
14 years 1 months ago
Efficient Logging and Replication Techniques for Comprehensive Data Protection
Mariner is an iSCSI-based storage system that is de­ signed to provide comprehensive data protection on com­ modity ATA disk and Gigabit Ethernet technologies while offering the...
Maohua Lu, Shibiao Lin, Tzi-cker Chiueh
FAST
2010
13 years 10 months ago
Understanding Latent Sector Errors and How to Protect Against Them
Latent sector errors (LSEs) refer to the situation where particular sectors on a drive become inaccessible. LSEs are a critical factor in data reliability, since a single LSE can ...
Bianca Schroeder, Sotirios Damouras, Phillipa Gill