Sciweavers

757 search results - page 115 / 152
» Composing Security-Aware Software
Sort
View
ICALT
2006
IEEE
15 years 4 months ago
Domain Ontology for Personalized E-Learning in Educational Systems
This paper introduces a domain ontology to describe learning material that compose a course, capable of providing adaptive e-learning environments and reusable educational resourc...
José Manuel Gascueña, Antonio Fern&a...
ICAT
2006
IEEE
15 years 4 months ago
Indoor/Outdoor Pedestrian Navigation with an Embedded GPS/RFID/Self-contained Sensor System
Abstract. This paper describes an embedded pedestrian navigation system composed of a self-contained sensors, the Global Positioning System (GPS) and an active Radio Frequency Iden...
Masakatsu Kourogi, Nobuchika Sakata, Takashi Okuma...
ISCA
2006
IEEE
138views Hardware» more  ISCA 2006»
15 years 4 months ago
Program Demultiplexing: Data-flow based Speculative Parallelization of Methods in Sequential Programs
We present Program Demultiplexing (PD), an execution paradigm that creates concurrency in sequential programs by "demultiplexing" methods (functions or subroutines). Cal...
Saisanthosh Balakrishnan, Gurindar S. Sohi
CASES
2006
ACM
15 years 4 months ago
FlashCache: a NAND flash memory file cache for low power web servers
We propose an architecture that uses NAND flash memory to reduce main memory power in web server platforms. Our architecture uses a two level file buffer cache composed of a re...
Taeho Kgil, Trevor N. Mudge
ICITA
2005
IEEE
15 years 3 months ago
A Structured Peer-to-Peer Method to Discover QoS Enhanced Alternate Paths
In the next generation Internet, the network should not only be considered as a communication medium, but also as an endless source of services available to the end-systems. These...
Thierry Rakotoarivelo, Patrick Sénac, Aruna...