Sciweavers

3516 search results - page 574 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
JTAER
2010
163views more  JTAER 2010»
14 years 10 months ago
A semantic query approach to personalized e-Catalogs service system
With the emergence of the e-Catalog, there has been an increasingly wide application of commodities query in distributed environment in the field of e-commerce. But e-Catalog is o...
Donglin Chen, Xiaofei Li, Yueling Liang, Jun Zhang
ICIC
2005
Springer
15 years 9 months ago
An Intelligent Assistant for Public Transport Management
This paper describes the architecture of a computer system conceived as an intelligent assistant for public transport management. The goal of the system is to help operators of a c...
Martín Molina
123
Voted
DAC
2007
ACM
16 years 5 months ago
Reducing Data-Memory Footprint of Multimedia Applications by Delay Redistribution
It is now common for multimedia applications to be partitioned and mapped onto multiple processing elements of a system-on-chip architecture. An important design constraint in suc...
Balaji Raman, Samarjit Chakraborty, Wei Tsang Ooi,...
IJITN
2010
177views more  IJITN 2010»
15 years 1 months ago
Real-Time Query Processing on Live Videos in Networks of Distributed Cameras
With the proliferation of inexpensive cameras and the availability of high-speed wired and wireless networks, systems of distributed cameras are becoming an enabling technology fo...
Rui Peng, Alexander J. Aved, Kien A. Hua
ICECCS
1998
IEEE
168views Hardware» more  ICECCS 1998»
15 years 8 months ago
The Architecture Tradeoff Analysis Method
This paper presents the Architecture Tradeoff Analysis Method (ATAM), a structured technique for understanding the tradeoffs inherent in design. This method was developed to provi...
Rick Kazman, Mark H. Klein, Mario Barbacci, Thomas...