Sciweavers

13985 search results - page 2548 / 2797
» Active Feature Models
Sort
View
IEEEARES
2006
IEEE
15 years 10 months ago
A Component Based Software Architecture for E-Government Applications
The raising need for e-government applications leads to many new approaches in this sector. To fulfill the requirement for a flexible government-to-government (G2G) software sys...
Daniel Beer, Raphael Kunis, Gudula Rünger
ISORC
2006
IEEE
15 years 10 months ago
Dynamically Deploying Web Services on a Grid using Dynasoar
Dynasoar is an infrastructure for dynamically deploying Web Services over a Grid or the Internet. It enables an approach to Grid computing in which distributed applications are bu...
Paul Watson, Chris Fowler, Charles Kubicek, Arijit...
ISPASS
2006
IEEE
15 years 10 months ago
Comparing multinomial and k-means clustering for SimPoint
SimPoint is a technique used to pick what parts of the program’s execution to simulate in order to have a complete picture of execution. SimPoint uses data clustering algorithms...
Greg Hamerly, Erez Perelman, Brad Calder
LCN
2006
IEEE
15 years 10 months ago
Landscape-3D; A Robust Localization Scheme for Sensor Networks over Complex 3D Terrains
— Despite the fact that sensor networks could often be deployed over three-dimensional (3D) terrains, most approaches on sensor localizations are designed and evaluated consideri...
Liqiang Zhang, Xiaobo Zhou, Qiang Cheng
MICRO
2006
IEEE
114views Hardware» more  MICRO 2006»
15 years 10 months ago
Authentication Control Point and Its Implications For Secure Processor Design
Secure processor architecture enables tamper-proof protection on software that addresses many difficult security problems such as reverse-engineering prevention, trusted computing...
Weidong Shi, Hsien-Hsin S. Lee
« Prev « First page 2548 / 2797 Last » Next »