Sciweavers

1795 search results - page 223 / 359
» Security Models and Information Flow
Sort
View
131
Voted
DAC
2006
ACM
16 years 4 months ago
Efficient detection and exploitation of infeasible paths for software timing analysis
Accurate estimation of the worst-case execution time (WCET) of a program is important for real-time embedded software. Static WCET estimation involves program path analysis and ar...
Vivy Suhendra, Tulika Mitra, Abhik Roychoudhury, T...
122
Voted
AGILEDC
2006
IEEE
15 years 9 months ago
The Role of Story Cards and the Wall in XP teams: A Distributed Cognition Perspective
Much of the knowledge used within an XP team is tacit, i.e. it is hidden and intangible. Two tangible artefacts that carry information about the team’s work are the index cards ...
Helen Sharp, Hugh Robinson, Judith Segal, Dominic ...
145
Voted
ADVIS
2000
Springer
15 years 8 months ago
Throughput Stability of Reliable Multicast Protocols
Traditional reliable multicast protocols depend on assumptions about flow control and reliability mechanisms, and they suffer from a kind of interference between these mechanisms. ...
Öznur Özkasap, Kenneth P. Birman
124
Voted
COOPIS
2004
IEEE
15 years 7 months ago
Discovering Workflow Transactional Behavior from Event-Based Log
Previous workflow mining works have concentrated their efforts on process behavioral aspects. Although powerful, these proposals are found lacking in functionalities and performanc...
Walid Gaaloul, Sami Bhiri, Claude Godart
147
Voted
DAWAK
2006
Springer
15 years 7 months ago
What Time Is It in the Data Warehouse?
Though in most data warehousing applications no relevance is given to the time when events are recorded, some domains call for a different behavior. In particular, whenever late re...
Stefano Rizzi, Matteo Golfarelli