Sciweavers

1795 search results - page 223 / 359
» Security Models and Information Flow
Sort
View
DAC
2006
ACM
14 years 11 months ago
Efficient detection and exploitation of infeasible paths for software timing analysis
Accurate estimation of the worst-case execution time (WCET) of a program is important for real-time embedded software. Static WCET estimation involves program path analysis and ar...
Vivy Suhendra, Tulika Mitra, Abhik Roychoudhury, T...
AGILEDC
2006
IEEE
14 years 4 months ago
The Role of Story Cards and the Wall in XP teams: A Distributed Cognition Perspective
Much of the knowledge used within an XP team is tacit, i.e. it is hidden and intangible. Two tangible artefacts that carry information about the team’s work are the index cards ...
Helen Sharp, Hugh Robinson, Judith Segal, Dominic ...
ADVIS
2000
Springer
14 years 2 months ago
Throughput Stability of Reliable Multicast Protocols
Traditional reliable multicast protocols depend on assumptions about flow control and reliability mechanisms, and they suffer from a kind of interference between these mechanisms. ...
Öznur Özkasap, Kenneth P. Birman
COOPIS
2004
IEEE
14 years 2 months ago
Discovering Workflow Transactional Behavior from Event-Based Log
Previous workflow mining works have concentrated their efforts on process behavioral aspects. Although powerful, these proposals are found lacking in functionalities and performanc...
Walid Gaaloul, Sami Bhiri, Claude Godart
DAWAK
2006
Springer
14 years 1 months ago
What Time Is It in the Data Warehouse?
Though in most data warehousing applications no relevance is given to the time when events are recorded, some domains call for a different behavior. In particular, whenever late re...
Stefano Rizzi, Matteo Golfarelli