Sciweavers

2400 search results - page 228 / 480
» Systems Failures
Sort
View
HOST
2008
IEEE
14 years 4 months ago
IC Activation and User Authentication for Security-Sensitive Systems
—A number of applications depend on the protection of security-sensitive hardware, preventing unauthorized users from gaining access to the functionality of the integrated circui...
Jiawei Huang, John Lach
APSEC
2007
IEEE
14 years 4 months ago
Requirements Engineering for Reactive Systems: Coloured Petri Nets for an Elevator Controller
This paper presents a model-based approach to requirements engineering for reactive systems; we use an elevator controller as case study. We identify and justify two key propertie...
João M. Fernandes, Jens Bæk Jø...
BTW
2007
Springer
152views Database» more  BTW 2007»
14 years 3 months ago
Armada: a Reference Model for an Evolving Database System
Abstract: The data on the web, in digital libraries, in scientific repositories, etc. continues to grow at an increasing rate. Distribution is a key solution to overcome this data...
Fabian Groffen, Martin L. Kersten, Stefan Manegold
IPPS
2006
IEEE
14 years 3 months ago
Checkpointing and rollback-recovery protocol for mobile systems with MW session guarantee
In the mobile environment, weak consistency replication of shared data is the key to obtaining high data availability, good access performance, and good scalability. Therefore new...
Jerzy Brzezinski, Anna Kobusinska, Michal Szychowi...
SAFECOMP
2004
Springer
14 years 3 months ago
Using Fuzzy Self-Organising Maps for Safety Critical Systems
This paper defines a type of constrained artificial neural network (ANN) that enables analytical certification arguments whilst retaining valuable performance characteristics. ...
Zeshan Kurd, Tim Kelly