Sciweavers

3893 search results - page 657 / 779
» Execution Architectures and Compilation
Sort
View
129
Voted
DAC
2008
ACM
15 years 5 months ago
SHIELD: a software hardware design methodology for security and reliability of MPSoCs
Security of MPSoCs is an emerging area of concern in embedded systems. Security is jeopardized by code injection attacks, which are the most common types of software attacks. Prev...
Krutartha Patel, Sri Parameswaran
166
Voted
CL
2008
Springer
15 years 3 months ago
Automatic synthesis and verification of real-time embedded software for mobile and ubiquitous systems
Currently available application frameworks that target the automatic design of real-time embedded software are poor in integrating functional and non-functional requirements for m...
Pao-Ann Hsiung, Shang-Wei Lin
152
Voted
TSE
2008
131views more  TSE 2008»
15 years 3 months ago
Enhancing an Application Server to Support Available Components
Three-tier middleware architecture is commonly used for hosting enterprise-distributed applications. Typically, the application is decomposed into three layers: front end, middle t...
Achmad I. Kistijantoro, Graham Morgan, Santosh K. ...
148
Voted
CBMS
2004
IEEE
15 years 7 months ago
Online Medical Teaching Case Database
Page >> Table of Contents >> Abstract 17th IEEE Symposium on Computer-Based Medical Systems (CBMS'04) p. 420 Online Medical Teaching Case Database Susan Kansagra, ...
Susan Kansagra, Chris Chang, Saleem Hussain, Grego...
234
Voted
ICDE
2008
IEEE
146views Database» more  ICDE 2008»
16 years 5 months ago
Handling Uncertain Data in Array Database Systems
Scientific and intelligence applications have special data handling needs. In these settings, data does not fit the standard model of short coded records that had dominated the dat...
Tingjian Ge, Stanley B. Zdonik