Sciweavers

3763 search results - page 652 / 753
» Component-Based Software Engineering Processes
Sort
View
114
Voted
EUROMICRO
2007
IEEE
15 years 8 months ago
SensBution: A Rule-Based Peer-to-Peer Approach for Sensor-Based Infrastructures
Ubiquitous environments facilitate the fast and easy access to users’ physical environments. Ubiquitous environments typically capture users’ presence and activities in a room...
Tom Gross, Thilo Paul-Stueve, Tsvetomira Palakarsk...
110
Voted
DRM
2007
Springer
15 years 8 months ago
Randomized radon transforms for biometric authentication via fingerprint hashing
We present a new technique for generating biometric fingerprint hashes, or summaries of information contained in human fingerprints. Our method calculates and aggregates various...
Mariusz H. Jakubowski, Ramarathnam Venkatesan
EMSOFT
2007
Springer
15 years 8 months ago
Scheduling multiple independent hard-real-time jobs on a heterogeneous multiprocessor
This paper proposes a scheduling strategy and an automatic scheduling flow that enable the simultaneous execution of multiple hard-real-time dataflow jobs. Each job has its own ...
Orlando Moreira, Frederico Valente, Marco Bekooij
ACSC
2006
IEEE
15 years 8 months ago
Manufacturing opaque predicates in distributed systems for code obfuscation
Code obfuscation is a relatively new technique of software protection and it works by deterring reverse engineering attempts by malicious users of software. The objective of obfus...
Anirban Majumdar, Clark D. Thomborson
CODES
2006
IEEE
15 years 8 months ago
TLM/network design space exploration for networked embedded systems
This paper presents a methodology to combine Transaction Level Modeling and System/Network co-simulation for the design of networked embedded systems. As a result, a new design di...
Nicola Bombieri, Franco Fummi, Davide Quaglia