Sciweavers

9842 search results - page 1642 / 1969
» Compositional timing analysis
Sort
View
EMS
2008
IEEE
15 years 6 months ago
Threat Modeling Revisited: Improving Expressiveness of Attack
Threat modeling plays an important role in the deployment of optimal security controls and a number of threat modeling techniques have been proposed. However, most of the existing...
Drake Patrick Mirembe, Maybin K. Muyeba
EMSOFT
2008
Springer
15 years 6 months ago
Energy efficient streaming applications with guaranteed throughput on MPSoCs
In this paper we present a design space exploration flow to achieve energy efficiency for streaming applications on MPSoCs while meeting the specified throughput constraints. The ...
Jun Zhu, Ingo Sander, Axel Jantsch
EMSOFT
2008
Springer
15 years 6 months ago
Disassembling real-time fault-tolerant programs
We focus on decomposition of hard-masking real-time faulttolerant programs (where safety, timing constraints, and liveness are preserved in the presence of faults) that are design...
Borzoo Bonakdarpour, Sandeep S. Kulkarni, Anish Ar...
ER
2008
Springer
179views Database» more  ER 2008»
15 years 6 months ago
Recommendation Based Process Modeling Support: Method and User Experience
Abstract Although most workflow management systems nowadays offer graphical editors for process modeling, the learning curve is still too steep for users who are unexperienced in p...
Thomas Hornung, Agnes Koschmider, Georg Lausen
127
Voted
ERCIMDL
2008
Springer
107views Education» more  ERCIMDL 2008»
15 years 6 months ago
Revisiting Lexical Signatures to (Re-)Discover Web Pages
A lexical signature (LS) is a small set of terms derived from a document that capture the "aboutness" of that document. A LS generated from a web page can be used to disc...
Martin Klein, Michael L. Nelson
« Prev « First page 1642 / 1969 Last » Next »