Sciweavers

2210 search results - page 307 / 442
» Applying a Model-based Approach for Embedded System Developm...
Sort
View
124
Voted
ICAC
2007
IEEE
15 years 9 months ago
Time-Sharing Parallel Applications with Performance Isolation and Control
Most parallel machines, such as clusters, are spaceshared in order to isolate batch parallel applications from each other and optimize their performance. However, this leads to lo...
Bin Lin, Ananth I. Sundararaj, Peter A. Dinda
141
Voted
HICSS
2012
IEEE
296views Biometrics» more  HICSS 2012»
13 years 10 months ago
Topology Perturbation for Detecting Malicious Data Injection
Bad measurement data exists in power systems for a number of reasons. Malicious data injection attacks, which alter the values of measurements without being detected, are one pote...
K. L. Morrow, Erich Heine, Katherine M. Rogers, Ra...
ICCS
2009
Springer
15 years 9 months ago
Spatial Relations Analysis by Using Fuzzy Operators
Spatial relations play important role in computer vision, scene analysis, geographic information systems (GIS) and content based image retrieval. Analyzing spatial relations by Fo...
Nadeem Salamat, El-hadi Zahzah
116
Voted
EGOV
2008
Springer
15 years 4 months ago
Test Strategies for Evaluation of Semantic eGovernment Applications
In this paper we present a framework for identifying the test focus and test objectives based on the assumption that automatic information processing based on encoded meaning is th...
Ralf Klischewski, Stefan Ukena
116
Voted
DAC
2008
ACM
16 years 3 months ago
ADAM: run-time agent-based distributed application mapping for on-chip communication
Design-time decisions can often only cover certain scenarios and fail in efficiency when hard-to-predict system scenarios occur. This drives the development of run-time adaptive s...
Jörg Henkel, Mohammad Abdullah Al Faruque, Ru...