Sciweavers

3516 search results - page 476 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
129
Voted
HICSS
2009
IEEE
105views Biometrics» more  HICSS 2009»
15 years 11 months ago
Ontological Support for Managing Non-Functional Requirements In Pervasive Healthcare
We designed and implemented an ontological solution which makes provisions for choosing adequate devices/sensors for remote monitoring of patients who are suffering from post-stro...
Nigel Koay, Pavandeep Kataria, Radmila Juric, Patr...
153
Voted
CASE
2011
102views more  CASE 2011»
14 years 4 months ago
Towards an automated verification process for industrial safety applications
— Legacy systems that do not conform to the norms and regulations imposed by recent safety standards have to be upgraded to meet safety requirements. In this paper, we describe a...
Kleanthis Thramboulidis, Doaa Soliman, Georg Frey
SIGCPR
2003
ACM
183views Hardware» more  SIGCPR 2003»
15 years 9 months ago
ERP training strategies: conceptual training and the formation of accurate mental models
Enterprise Resource Planning (ERP) systems are large, complex integrated software applications that often take years to implement. This study examined a major determinant of succe...
Tony Coulson, Conrad Shayo, Lorne Olfman, C. E. Ta...

Publication
576views
17 years 4 months ago
Within-die Process Variations: How Accurately can They Be Statistically Modeled?
Within-die process variations arise during integrated circuit (IC) fabrication in the sub-100nm regime. These variations are of paramount concern as they deviate the performance of...
Brendan Hargreaves, Henrik Hult, Sherief Reda
SAC
2010
ACM
15 years 11 months ago
Performance analysis of FlexRay-based systems using real-time calculus, revisited
The FlexRay protocol [4] is likely to be the de facto standard for automotive communication systems. Hence, there is a need to provide hard performance guarantees on properties li...
Devesh B. Chokshi, Purandar Bhaduri