Sciweavers

2625 search results - page 85 / 525
» Applications 2000
Sort
View
114
Voted
ISORC
2000
IEEE
15 years 8 months ago
Scheduling Solutions for Supporting Dependable Real-Time Applications
This paper deals with tolerance to timing faults in time-constrained systems. TAFT (Time Aware Fault-Tolerant) is a recently devised approach which applies tolerance to timing vio...
F. Sandrini, Felicita Di Giandomenico, Andrea Bond...
156
Voted
WETICE
2000
IEEE
15 years 8 months ago
CVE Technology Development Based on Real World Application and User Needs
This paper argues that the development of Collaborative Virtual Environment (CVE) technology must be guided by application and end user needs. A collaboration is described between ...
Daphne Economou, William L. Mitchell, Steve Pettif...
124
Voted
CAISE
2000
Springer
15 years 8 months ago
Extending a Conceptual Modelling Approach to Web Application Design
Abstract This article presents OO-HMethod, an extension of the OOMethod conceptual modelling approach to address the particulars associated with the design of web interfaces. It is...
Jaime Gómez, Cristina Cachero, Oscar Pastor
259
Voted
CRYPTO
2000
Springer
277views Cryptology» more  CRYPTO 2000»
15 years 7 months ago
Almost Independent and Weakly Biased Arrays: Efficient Constructions and Cryptologic Applications
The best known constructions for arrays with low bias are those from [1] and the exponential sum method based on the WeilCarlitz-Uchiyama bound. They all yield essentially the same...
Jürgen Bierbrauer, Holger Schellwat
138
Voted
ISHPC
2000
Springer
15 years 7 months ago
Automatic Generation of OpenMP Directives and Its Application to Computational Fluid Dynamics Codes
The shared-memory programming model is a very effective way to achieve parallelism on shared memory parallel computers. As great progress was made in hardware and software technolo...
Haoqiang Jin, Michael A. Frumkin, Jerry C. Yan