Sciweavers

1210 search results - page 165 / 242
» Specifying Precise Use Cases with Use Case Charts
Sort
View
DIAGRAMS
2000
Springer
14 years 1 months ago
Positive Semantics of Projections in Venn-Euler Diagrams
Venn diagrams and Euler circles have long been used as a means of expressing relationships among sets using visual metaphors such as \disjointness" and \containment" of t...
Joseph Gil, John Howse, Elena Tulchinsky
ISSS
1998
IEEE
124views Hardware» more  ISSS 1998»
14 years 1 months ago
Data-Path Synthesis of VLIW Video Signal Processors
This paper describes a methodology for synthesizing the data-path of a Very Long Instruction Word (VLIW) based Video Signal Processor (VSP). Offering both performance and programm...
Zhao Wu, Wayne Wolf
SP
2010
IEEE
182views Security Privacy» more  SP 2010»
14 years 24 days ago
All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask)
—Dynamic taint analysis and forward symbolic execution are quickly becoming staple techniques in security analyses. Example applications of dynamic taint analysis and forward sym...
Edward J. Schwartz, Thanassis Avgerinos, David Bru...
GIS
2009
ACM
14 years 24 days ago
Dynamic network data exploration through semi-supervised functional embedding
The paper presents a framework for semi-supervised nonlinear embedding methods useful for exploratory analysis and visualization of spatio-temporal network data. The method provid...
Alexei Pozdnoukhov
ICECCS
2007
IEEE
120views Hardware» more  ICECCS 2007»
14 years 23 days ago
Verifying the CICS File Control API with Z/Eves: An Experiment in the Verified Software Repository
Parts of the CICS transaction processing system were modelled formally in the 1980s in a collaborative project between IBM Hursley Park and Oxford University Computing Laboratory....
Leo Freitas, Konstantinos Mokos, Jim Woodcock