Sciweavers

10707 search results - page 247 / 2142
» Designing executable abstractions
Sort
View
INTERNET
2002
145views more  INTERNET 2002»
15 years 3 months ago
Where is Middleware?
stract level, remote procedure calls enable programmers to invoke (possibly remote) services as if they were intra-application procedure calls. Much like function or procedure call...
Steve Vinoski
ICISC
2009
132views Cryptology» more  ICISC 2009»
15 years 1 months ago
Side-Channel Analysis of Cryptographic Software via Early-Terminating Multiplications
Abstract. The design of embedded processors demands a careful tradeoff between many conflicting objectives such as performance, silicon area and power consumption. Finding such a t...
Johann Großschädl, Elisabeth Oswald, Da...
157
Voted
TII
2010
146views Education» more  TII 2010»
14 years 10 months ago
PAUC: Power-Aware Utilization Control in Distributed Real-Time Systems
Abstract--CPU utilization control has recently been demonstrated to be an effective way of meeting end-to-end deadlines for distributed real-time systems running in unpredictable e...
Xiaorui Wang, Xing Fu, Xue Liu, Zonghua Gu
TOPNOC
2010
14 years 10 months ago
On-the-Fly Auditing of Business Processes
Information systems supporting business process are mostly very complex. If we have to ensure that certain business rules are enforced in a business process, it is often easier to ...
Kees M. van Hee, Jan Hidders, Geert-Jan Houben, Ja...
AOSE
2005
Springer
15 years 9 months ago
Hermes: Designing Goal-Oriented Agent Interactions
Interactions between agents are traditionally specified as interaction protocols using notations such as Petri nets, AUML, or finite state machines. These protocols are a poor ...
Christopher Cheong, Michael Winikoff