Sciweavers

2878 search results - page 537 / 576
» Analyzing the Uses of a Software Modeling Tool
Sort
View
DAC
2004
ACM
16 years 2 months ago
Security as a new dimension in embedded system design
The growing number of instances of breaches in information security in the last few years has created a compelling case for efforts towards secure electronic systems. Embedded sys...
Srivaths Ravi, Paul C. Kocher, Ruby B. Lee, Gary M...
CAV
2009
Springer
133views Hardware» more  CAV 2009»
16 years 2 months ago
Cardinality Abstraction for Declarative Networking Applications
ity Abstraction for Declarative Networking Applications Juan A. Navarro P?erez, Andrey Rybalchenko, and Atul Singh Max Planck Institute for Software Systems (MPI-SWS) Declarative N...
Andrey Rybalchenko, Atul Singh, Juan Antonio Navar...
CANDT
2009
15 years 5 months ago
The conference room as a toolbox: technological and social routines in corporate meeting spaces
HCI, CSCW, and ubicomp researchers have developed new technologies and interaction techniques to support collaboration, ranging from electronic whiteboards to software supporting ...
Christopher Plaue, John T. Stasko, Mark Baloga
CAMAD
2006
IEEE
15 years 5 months ago
A packet-level characterization of network traffic
In this paper we show results from a packet-level traffic characterization aiming at finding spatial and temporal invariances of TCP based applications, such as HTTP and SMTP. We d...
Alberto Dainotti, Antonio Pescapè, Giorgio ...
BMCBI
2010
131views more  BMCBI 2010»
15 years 1 months ago
JISTIC: Identification of Significant Targets in Cancer
Background: Cancer is caused through a multistep process, in which a succession of genetic changes, each conferring a competitive advantage for growth and proliferation, leads to ...
Felix Sanchez-Garcia, Uri David Akavia, Eyal Mozes...