Sciweavers

34181 search results - page 67 / 6837
» The Computer System GRAPHOGRAPH
Sort
View
TACAS
2010
Springer
162views Algorithms» more  TACAS 2010»
14 years 2 months ago
Computing the Leakage of Information-Hiding Systems
We address the problem of computing the information leakage of a system in an efficient way. We propose two methods: one based on reducing the problem to reachability, and the oth...
Miguel E. Andrés, Catuscia Palamidessi, Pet...
HPDC
1999
IEEE
14 years 1 days ago
Predicting the CPU Availability of Time-shared Unix Systems on the Computational Grid
In this paper we focus on the problem of making short and medium term forecasts of CPU availability on timeshared Unix systems. We evaluate the accuracy with which availability ca...
Richard Wolski, Neil T. Spring, Jim Hayes
FM
2003
Springer
107views Formal Methods» more  FM 2003»
14 years 29 days ago
Verifying Emulation of Legacy Mission Computer Systems
Processor obsolescence is a serious maintenance problem for long-lived embedded control systems. A practical solution is to interpose an emulator program between the ‘legacy’ s...
Colin J. Fidge
DATE
2000
IEEE
116views Hardware» more  DATE 2000»
14 years 4 days ago
An Object Oriented Design Method for Reconfigurable Computing Systems
We present a novel method for developing reconfigurable systems targeted at embedded system applications. We show how an existing object oriented design method (MOOSE) has been ad...
Martyn Edwards, Peter Green
ATAL
2011
Springer
12 years 7 months ago
Decomposing constraint systems: equivalences and computational properties
Distributed systems can often be modeled as a collection of distributed (system) variables whose values are constrained by a set of constraints. In distributed multi-agent systems...
Wiebe van der Hoek, Cees Witteveen, Michael Wooldr...