Sciweavers

2236 search results - page 375 / 448
» Secure Software Design in Practice
Sort
View
CASSIS
2004
Springer
14 years 2 months ago
Verification of Safety Properties in the Presence of Transactions
The JAVA CARD transaction mechanism can ensure that a sequence of statements either is executed to completion or is not executed at all. Transactions make verification of JAVA CARD...
Reiner Hähnle, Wojciech Mostowski
CF
2005
ACM
14 years 29 days ago
Reversible logic for supercomputing
This paper is about making reversible logic a reality for supercomputing. Reversible logic offers a way to exceed certain basic limits on the performance of computers, yet a power...
Erik DeBenedictis
APCCM
2009
14 years 3 days ago
Modelling Web-Oriented Architectures
Service-oriented architectures (SOAs) provide the basis of distributed application frameworks where software components are provided as modular and reusable services. Until today ...
Gunnar Thies, Gottfried Vossen
GECCO
2008
Springer
147views Optimization» more  GECCO 2008»
14 years 1 days ago
On selecting the best individual in noisy environments
In evolutionary algorithms, the typical post-processing phase involves selection of the best-of-run individual, which becomes the final outcome of the evolutionary run. Trivial f...
Wojciech Jaskowski, Wojciech Kotlowski
CORR
2008
Springer
144views Education» more  CORR 2008»
13 years 11 months ago
Modular Compilation of a Synchronous Language
Synchronous languages rely on formal methods to ease the development of applications in an efficient and reusable way. Formal methods have been advocated as a means of increasing t...
Annie Ressouche, Daniel Gaffé, Valér...