Sciweavers

276 search results - page 42 / 56
» Security in Context: Analysis and Refinement of Software Arc...
Sort
View
FOSSACS
2010
Springer
14 years 2 months ago
Reachability Analysis of Communicating Pushdown Systems
Abstract. The reachability analysis of recursive programs that communicate asynchronously over reliable Fifo channels calls for restrictions to ensure decidability. We extend here ...
Alexander Heußner, Jérôme Lerou...
IPPS
2009
IEEE
14 years 3 months ago
Implementing and evaluating multithreaded triad census algorithms on the Cray XMT
Commonly represented as directed graphs, social networks depict relationships and behaviors among social entities such as people, groups, and organizations. Social network analysi...
George Chin Jr., Andrès Márquez, Sut...
DEXAW
2003
IEEE
131views Database» more  DEXAW 2003»
14 years 1 months ago
Privacy and Trusted Computing
This paper examines a model of trusted computing wherein a computing platform is able to make assertions about its current software configuration that may be trusted by the user ...
Juan Manuel González Nieto, Ed Dawson, Eiji...
SELMAS
2004
Springer
14 years 1 months ago
Integrating Free-Flow Architectures with Role Models Based on Statecharts
Abstract. Engineering non-trivial open multi-agent systems is a challenging task. Our research focusses on situated multi-agent systems, i.e. systems in which agents are explicitly...
Danny Weyns, Elke Steegmans, Tom Holvoet
SPAA
2006
ACM
14 years 2 months ago
Modeling instruction placement on a spatial architecture
In response to current technology scaling trends, architects are developing a new style of processor, known as spatial computers. A spatial computer is composed of hundreds or eve...
Martha Mercaldi, Steven Swanson, Andrew Petersen, ...