Sciweavers

2036 search results - page 378 / 408
» Analysis of the XC6000 Architecture for Embedded System Desi...
Sort
View
SACMAT
2009
ACM
15 years 4 months ago
Ensuring spatio-temporal access control for real-world applications
Traditional access control models, such as Role-Based Access Control (RBAC), do not take into account contextual information, such as location and time, for making access decision...
Manachai Toahchoodee, Indrakshi Ray, Kyriakos Anas...
KBSE
2005
IEEE
15 years 3 months ago
Determining the cost-quality trade-off for automated software traceability
Major software development standards mandate the establishment of trace links among software artifacts such as requirements, architectural elements, or source code without explici...
Alexander Egyed, Stefan Biffl, Matthias Heindl, Pa...
GIS
2008
ACM
15 years 11 months ago
GISolve toolkit: advancing GIS through cyberinfrastructure
Cyberinfrastructure integrates information and communication technologies to enable high-performance, distributed, and collaborative knowledge discovery, and promises to revolutio...
Shaowen Wang
ICIAR
2009
Springer
15 years 2 months ago
VizDraw: A Platform to Convert Online Hand-Drawn Graphics into Computer Graphics
Abstract. With the adoption of tablet-based data entry devices, there is considerable interest in methods for converting hand-drawn sketches of flow charts, graphs and block diagr...
Akshaya Kumar Mishra, Justin A. Eichel, Paul W. Fi...
PODC
1994
ACM
15 years 2 months ago
A Performance Evaluation of Lock-Free Synchronization Protocols
In this paper, we investigate the practical performance of lock-free techniques that provide synchronization on shared-memory multiprocessors. Our goal is to provide a technique t...
Anthony LaMarca