Sciweavers

146 search results - page 25 / 30
» Sequential Traitor Tracing
Sort
View
SAC
2009
ACM
14 years 3 months ago
Runtime monitoring of web service choreographies using streaming XML
A wide range of web service choreography constraints on the content and sequentiality of messages can be translated into Linear Temporal Logic (LTL). Although they can be statical...
Sylvain Hallé, Roger Villemaire
ECWEB
2009
Springer
112views ECommerce» more  ECWEB 2009»
14 years 3 months ago
Towards Privacy Compliant and Anytime Recommender Systems
Abstract. Recommendation technologies have traditionally been used in domains such as E-commerce and Web navigation to recommend resources to customers so as to help them to get th...
Armelle Brun, Anne Boyer
IEEEARES
2006
IEEE
14 years 3 months ago
Application of the Digraph Method in System Fault Diagnostics
There is an increasing demand for highly reliable systems in the safety conscious climate of today’s world. When a fault does occur there are two desirable outcomes. Firstly, de...
E. M. Kelly, L. M. Bartlett
VL
2000
IEEE
120views Visual Languages» more  VL 2000»
14 years 1 months ago
Visualizing the Synchronization of Java-Threads with UML
Concurrent programming is a complex task, even with modern languages such as Java who provide languagebased support for multithreading and synchronization. In addition to typical ...
Katharina Mehner, Annika Wagner
MSS
1999
IEEE
203views Hardware» more  MSS 1999»
14 years 1 months ago
Improved Adaptive Replacement Algorithm for Disk-Caches in HSM Systems
With an ever increasing amount of data to store, hierarchical storage management (HSM) systems must still use tape for tertiary storage. A disk cache is used to reduce the access ...
Ulrich Hahn, Werner Dilling, Dietmar Kaletta