Sciweavers

8503 search results - page 1524 / 1701
» Secure Software Architectures
Sort
View
DAC
2003
ACM
14 years 11 months ago
A hybrid SAT-based decision procedure for separation logic with uninterpreted functions
SAT-based decision procedures for quantifier-free fragments of firstorder logic have proved to be useful in formal verification. These decision procedures are either based on enco...
Sanjit A. Seshia, Shuvendu K. Lahiri, Randal E. Br...
DAC
2005
ACM
14 years 11 months ago
Improving java virtual machine reliability for memory-constrained embedded systems
Dual-execution/checkpointing based transient error tolerance techniques have been widely used in the high-end mission critical systems. These techniques, however, are not very att...
Guangyu Chen, Mahmut T. Kandemir
ISBI
2006
IEEE
14 years 11 months ago
Development of a research interface for image guided intervention: initial application to epilepsy neurosurgery
This paper describes the development and application of methods to integrate research image analysis methods and software with a commercial image guided surgery navigation system ...
Xenophon Papademetris, Kenneth P. Vives, Marcello ...
WWW
2004
ACM
14 years 10 months ago
HPG: a tool for presentation generation in WIS
Web Information Systems (WIS) support the process of retrieving information from sources on the Web and of presenting them as a hypermedia presentation. Most WIS design ogies focu...
Bas Rutten, Peter Barna, Flavius Frasincar, Geert-...
WWW
2004
ACM
14 years 10 months ago
Site-to-site (s2s) searching using the p2p framework with cgi
Peer-To-Peer (P2P) networks like Gnutella improve some shortcomings of Conventional Search Engines (CSE) such as centralized and outdated indexing by distributing the search engin...
Wan Yeung Wong
« Prev « First page 1524 / 1701 Last » Next »