Sciweavers

3516 search results - page 184 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
141
Voted
ICWE
2007
Springer
15 years 9 months ago
Integrating Databases, Search Engines and Web Applications: A Model-Driven Approach
This paper addresses conceptual modeling and automatic code generation for search engine integration with data intensive Web applications. We have analyzed the similarities (and di...
Alessandro Bozzon, Tereza Iofciu, Wolfgang Nejdl, ...
EDO
2005
Springer
15 years 9 months ago
Secure event types in content-based, multi-domain publish/subscribe systems
Publish/subscribe research has so far been mostly focused on efficient event routing, event filtering, and composite event detection. The little research that has been published ...
Lauri I. W. Pesonen, Jean Bacon
134
Voted
SAMOS
2007
Springer
15 years 9 months ago
An Evolutionary Approach to Area-Time Optimization of FPGA designs
—This paper presents a new methodology based on evolutionary multi-objective optimization (EMO) to synthesize multiple complex modules on programmable devices (FPGAs). It starts ...
Fabrizio Ferrandi, Pier Luca Lanzi, Gianluca Paler...
128
Voted
DSN
2004
IEEE
15 years 7 months ago
An Architectural Framework for Providing Reliability and Security Support
This paper explores hardware-implemented error-detection and security mechanisms embedded as modules in a hardware-level framework called the Reliability and Security Engine (RSE)...
Nithin Nakka, Zbigniew Kalbarczyk, Ravishankar K. ...
191
Voted
ICDE
2012
IEEE
269views Database» more  ICDE 2012»
13 years 5 months ago
A Deep Embedding of Queries into Ruby
—We demonstrate SWITCH, a deep embedding of relational queries into RUBY and RUBY on RAILS. With SWITCH, there is no syntactic or stylistic difference between RUBY programs that ...
Torsten Grust, Manuel Mayr