Sciweavers

1076 search results - page 180 / 216
» Feature Identification: A Novel Approach and a Case Study
Sort
View
101
Voted
SC
2000
ACM
15 years 4 months ago
Expressing and Enforcing Distributed Resource Sharing Agreements
Advances in computing and networking technology, and an explosion in information sources has resulted in a growing number of distributed systems getting constructed out of resourc...
Tao Zhao, Vijay Karamcheti
ESTIMEDIA
2008
Springer
15 years 2 months ago
A framework for memory-aware multimedia application mapping on chip-multiprocessors
The relentless increase in multimedia embedded system application requirements as well as improvements in IC design technology have motivated the deployment of chip multiprocessor ...
Luis Angel D. Bathen, Nikil D. Dutt, Sudeep Pasric...
130
Voted
DATE
2010
IEEE
154views Hardware» more  DATE 2010»
15 years 1 months ago
Computing robustness of FlexRay schedules to uncertainties in design parameters
Abstract--In the current environment of rapidly changing invehicle requirements and ever-increasing functional content for automotive EE systems, there are several sources of uncer...
Arkadeb Ghosal, Haibo Zeng, Marco Di Natale, Yakov...
82
Voted
ERCIMDL
2010
Springer
135views Education» more  ERCIMDL 2010»
15 years 1 months ago
Automating Logical Preservation for Small Institutions with Hoppla
Preserving digital information over the long term becomes increasing important for large number of institutions. The required expertise and limited tool support discourage especial...
Stephan Strodl, Petar Petrov, Michael Greifeneder,...
98
Voted
JSW
2007
106views more  JSW 2007»
15 years 12 days ago
Destabilization of Terrorist Networks through Argument Driven Hypothesis Model
— Social network analysis has been used for quite some time to analyze and understand the behavior of nodes in the network. Theses nodes could be individuals or group of persons,...
Dil Muhammad Akbar Hussain