Sciweavers

3318 search results - page 161 / 664
» The Weak Instance Model
Sort
View
ICECCS
2009
IEEE
161views Hardware» more  ICECCS 2009»
14 years 2 months ago
Formal Modelling and Analysis of Business Information Applications with Fault Tolerant Middleware
Distributed information systems are critical to the functioning of many businesses; designing them to be dependable is a challenging but important task. We report our experience i...
Jeremy Bryans, John S. Fitzgerald, Alexander Roman...
HASE
2007
IEEE
14 years 2 months ago
Integrating Product-Line Fault Tree Analysis into AADL Models
Fault Tree Analysis (FTA) is a safety-analysis technique that has been recently extended to accommodate product-line engineering for critical domains. This paper describes a tool-...
Hongyu Sun, Miriam Hauptman, Robyn R. Lutz
ACMMSP
2006
ACM
250views Hardware» more  ACMMSP 2006»
14 years 2 months ago
What do high-level memory models mean for transactions?
Many people have proposed adding transactions, or atomic blocks, to type-safe high-level programming languages. However, researchers have not considered the semantics of transacti...
Dan Grossman, Jeremy Manson, William Pugh
ACSAC
2005
IEEE
14 years 1 months ago
Securing Email Archives through User Modeling
Online email archives are an under-protected yet extremely sensitive information resource. Email archives can store years worth of personal and business email in an easy-to-access...
Yiru Li, Anil Somayaji
WACV
2005
IEEE
14 years 1 months ago
Semi-Supervised Self-Training of Object Detection Models
The construction of appearance-based object detection systems is time-consuming and difficult because a large number of training examples must be collected and manually labeled i...
Chuck Rosenberg, Martial Hebert, Henry Schneiderma...