Sciweavers

982 search results - page 180 / 197
» The reflective transformative design process
Sort
View
CCS
2007
ACM
14 years 2 months ago
Specifying and analyzing security automata using CSP-OZ
Security automata are a variant of B¨uchi automata used to specify security policies that can be enforced by monitoring system execution. In this paper, we propose using CSP-OZ, ...
David A. Basin, Ernst-Rüdiger Olderog, Paul E...
EMSOFT
2005
Springer
14 years 2 months ago
Synchronization of periodic clocks
We propose a programming model dedicated to real-time videostreaming applications for embedded media devices, including highdefinition TVs. This model is built on the synchronous...
Albert Cohen, Marc Duranton, Christine Eisenbeis, ...
HVC
2005
Springer
97views Hardware» more  HVC 2005»
14 years 1 months ago
An Extensible Open-Source Compiler Infrastructure for Testing
Testing forms a critical part of the development process for large-scale software, and there is growing need for automated tools that can read, represent, analyze, and transform th...
Daniel J. Quinlan, Shmuel Ur, Richard W. Vuduc
COMPSAC
1997
IEEE
14 years 20 days ago
A formal approach to software components classification and retrieval
I n this paper, we propose an approach to reuse-based software development using formal method. I n our approach, each software component is annotated with a set of predicates to ...
Chao-Tsun Chang, William C. Chu, Chung-Shyan Liu, ...
AMR
2006
Springer
137views Multimedia» more  AMR 2006»
14 years 5 days ago
A General Principled Method for Image Similarity Validation
A novel and general criterion for image similarity validation is introduced using the so-called a contrario decision framework. It is mathematically proved that it is possible to c...
Frédéric Cao, Patrick Bouthemy