Sciweavers

7623 search results - page 1434 / 1525
» Constructive Volume Modeling
Sort
View
JCP
2008
116views more  JCP 2008»
15 years 1 months ago
Sensor Location Strategy in Large-Scale Systems for Fault Detection Applications
Fault detection in large-scale systems is conducted by the use of sensors, thus the sensor location influences the performances of fault detection directly. As the scale of systems...
Fan Yang, Deyun Xiao
ISCA
2006
IEEE
130views Hardware» more  ISCA 2006»
15 years 1 months ago
Area-Performance Trade-offs in Tiled Dataflow Architectures
: Tiled architectures, such as RAW, SmartMemories, TRIPS, and WaveScalar, promise to address several issues facing conventional processors, including complexity, wire-delay, and pe...
Steven Swanson, Andrew Putnam, Martha Mercaldi, Ke...
JISE
2008
77views more  JISE 2008»
15 years 1 months ago
Formalized Entity Extraction Methodology for Changeable Business Requirements
business requirement in the real world cannot be abstracted correctly into an entity-relationship schema. Once core entities are discovered, we can obtain an Entity-Relationship Di...
Namgyu Kim, Sangwon Lee, Songchun Moon
JUCS
2008
186views more  JUCS 2008»
15 years 1 months ago
A Safe Dynamic Adaptation Framework for Aspect-Oriented Software Development
: One focus of current software development is the re-use of components in the construction of systems. Software Adaptation facilitates the consequent need to adapt these component...
Miguel Ángel Pérez Toledano, Amparo ...
JUCS
2008
113views more  JUCS 2008»
15 years 1 months ago
What is Correctness of Security Protocols?
: As soon as major protocol flaws were discovered empirically -- a good luck that is not older than the early 1990s -- this title question came up to the world. It was soon realise...
Giampaolo Bella
« Prev « First page 1434 / 1525 Last » Next »