Sciweavers

412 search results - page 58 / 83
» RATSY - A New Requirements Analysis Tool with Synthesis
Sort
View
ISCA
2003
IEEE
169views Hardware» more  ISCA 2003»
14 years 3 months ago
Virtual Simple Architecture (VISA): Exceeding the Complexity Limit in Safe Real-Time Systems
Meeting deadlines is a key requirement in safe realtime systems. Worst-case execution times (WCET) of tasks are needed for safe planning. Contemporary worst-case timing analysis t...
Aravindh Anantaraman, Kiran Seth, Kaustubh Patil, ...
SIGMOD
1999
ACM
183views Database» more  SIGMOD 1999»
14 years 2 months ago
OPTICS: Ordering Points To Identify the Clustering Structure
Cluster analysis is a primary method for database mining. It is either used as a stand-alone tool to get insight into the distribution of a data set, e.g. to focus further analysi...
Mihael Ankerst, Markus M. Breunig, Hans-Peter Krie...
IV
2007
IEEE
152views Visualization» more  IV 2007»
14 years 4 months ago
Geovisualization and synergies from InfoVis and Visual Analytics
Geovisualization (GeoViz) is an intrinsically complex process. The analyst needs to look at data from various perspectives and at various scales, from “seeing the whole” to ...
Gennady L. Andrienko, Mikael Jern, Jason Dykes, Sa...
JDCTA
2010
187views more  JDCTA 2010»
13 years 5 months ago
Automatic Verification of Security Properties in Remote Internet Voting Protocol with Applied Pi Calculus
Soundness and coercion resistance are the important and intricate security requirements for remote voting protocols. Several formal models of soundness and coercion-resistance hav...
Bo Meng, Wei Huang, Zimao Li, Dejun Wang
AOSD
2008
ACM
14 years 20 days ago
"Program, enhance thyself!": demand-driven pattern-oriented program enhancement
Program enhancement refers to adding new functionality to an existing program. We argue that repetitive program enhancement tasks can be expressed as patterns, and that the applic...
Eli Tilevich, Godmar Back