Sciweavers

2111 search results - page 109 / 423
» How to Program Pervasive Systems
Sort
View
POPL
2011
ACM
14 years 3 months ago
Static analysis of interrupt-driven programs synchronized via the priority ceiling protocol
We consider programs for embedded real-time systems which use priority-driven preemptive scheduling with task priorities adjusted dynamically according to the immediate ceiling pr...
Martin D. Schwarz, Helmut Seidl, Vesal Vojdani, Pe...
68
Voted
HICSS
2006
IEEE
77views Biometrics» more  HICSS 2006»
15 years 6 months ago
System-Wide Replacement Strategy for Substation Protection and Automation Systems
The protection and control systems in the US utility industry are still primarily composed of electromechanical relays and systems. Over 80 percent of the relays are still electro...
Paul T. Myrda, Eric A. Udren
ICDE
2006
IEEE
166views Database» more  ICDE 2006»
16 years 2 months ago
WebIQ: Learning from the Web to Match Deep-Web Query Interfaces
Integrating Deep Web sources requires highly accurate semantic matches between the attributes of the source query interfaces. These matches are usually established by comparing th...
Wensheng Wu, AnHai Doan, Clement T. Yu
85
Voted
WWW
2005
ACM
16 years 1 months ago
Web resource geographic location classification and detection
Rapid pervasion of the web into users' daily lives has put much importance on capturing location-specific information on the web, due to the fact that most human activities o...
Chuang Wang, Xing Xie, Lee Wang, Yansheng Lu, Wei-...
106
Voted
ICSE
2007
IEEE-ACM
16 years 22 days ago
The CRUTIAL Architecture for Critical Information Infrastructures
Abstract. In this chapter we discuss the susceptibility of critical information infrastructures to computer-borne attacks and faults, mainly due to their largely computerized natur...
Paulo Veríssimo, Nuno Ferreira Neves, Migue...