Sciweavers

3318 search results - page 104 / 664
» The Weak Instance Model
Sort
View
I3E
2001
196views Business» more  I3E 2001»
13 years 9 months ago
Security Modelling for Electronic Commerce: The Common Electronic Purse Specifications
: Designing security-critical systems correctly is very difficult. We present work on software engineering of security critical systems, supported by the CASE tool AUTOFOCUS. Secur...
Jan Jürjens, Guido Wimmel
MASCOTS
2003
13 years 9 months ago
Computer Virus Propagation Models
Abstract. The availability of reliable models of computer virus propagation would prove useful in a number of ways, in order both to predict future threats, and to develop new cont...
Giuseppe Serazzi, Stefano Zanero
CONCURRENCY
2000
99views more  CONCURRENCY 2000»
13 years 7 months ago
The Java memory model is fatally flawed
The Java memory model described in Chapter 17 of the Java Language Specification gives constraints on how threads interact through memory. This chapter is hard to interpret and po...
William Pugh
TSP
2010
13 years 2 months ago
Dynamic spectrum management with the competitive market model
[1, 2] have shown for the dynamic spectrum allocation problem that a competitive market model (which sets a price for transmission power on each channel) leads to a greater social...
Yao Xie, Benjamin Armbruster, Yinyu Ye
ICCS
2009
Springer
14 years 2 months ago
A Parallel High-Order Discontinuous Galerkin Shallow Water Model
The depth-integrated shallow water equations are frequently used for simulating geophysical flows, such as storm-surges, tsunamis and river flooding. In this paper a parallel sha...
Claes Eskilsson, Yaakoub El Khamra, David Rideout,...