Sciweavers

1890 search results - page 287 / 378
» A component model for building systems software
Sort
View
JHSN
2006
267views more  JHSN 2006»
14 years 10 months ago
Client-side access control enforcement using trusted computing and PEI models
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard ...
Ravi S. Sandhu, Xinwen Zhang, Kumar Ranganathan, M...
ISCAS
2007
IEEE
101views Hardware» more  ISCAS 2007»
15 years 5 months ago
Automated HDL Generation: Comparative Evaluation
— Reconfigurable computing (RC) systems, coupling general purpose processor with reconfigurable components, offer a lot of advantages. Nevertheless, currently a designer needs ...
Yana Yankova, Koen Bertels, Stamatis Vassiliadis, ...
CORR
2008
Springer
102views Education» more  CORR 2008»
14 years 10 months ago
Spreadsheet modelling for solving combinatorial problems: The vendor selection problem
Spreadsheets have grown up and became very powerful and easy to use tools in applying analytical techniques for solving business problems. Operations managers, production managers...
Pandelis G. Ipsilandis
SELMAS
2004
Springer
15 years 4 months ago
Integrating Free-Flow Architectures with Role Models Based on Statecharts
Abstract. Engineering non-trivial open multi-agent systems is a challenging task. Our research focusses on situated multi-agent systems, i.e. systems in which agents are explicitly...
Danny Weyns, Elke Steegmans, Tom Holvoet
ENTCS
2006
180views more  ENTCS 2006»
14 years 10 months ago
Mobile Synchronizing Petri Nets: A Choreographic Approach for Coordination in Ubiquitous Systems
The term Ubiquitous Computing was coined by Mark Weiser almost two decades ago. Despite all the time that has passed since Weiser's vision, ubiquitous computing still has a l...
Fernando Rosa Velardo, Olga Marroquín Alons...