Sciweavers

3516 search results - page 636 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
117
Voted
EDO
2005
Springer
15 years 9 months ago
Optimizing layered middleware
Middleware is often built using a layered architectural style. Layered design provides good separation of the different concerns of middleware, such as communication, marshaling, ...
Ömer Erdem Demir, Premkumar T. Devanbu, Eric ...
145
Voted
ISCA
2010
IEEE
336views Hardware» more  ISCA 2010»
15 years 8 months ago
Reducing cache power with low-cost, multi-bit error-correcting codes
Technology advancements have enabled the integration of large on-die embedded DRAM (eDRAM) caches. eDRAM is significantly denser than traditional SRAMs, but must be periodically r...
Chris Wilkerson, Alaa R. Alameldeen, Zeshan Chisht...
145
Voted
MOBISYS
2010
ACM
15 years 6 months ago
Darwin phones: the evolution of sensing and inference on mobile phones
We present Darwin, an enabling technology for mobile phone sensing that combines collaborative sensing and classification techniques to reason about human behavior and context on ...
Emiliano Miluzzo, Cory Cornelius, Ashwin Ramaswamy...
122
Voted
WWW
2006
ACM
16 years 4 months ago
Towards content trust of web resources
Trust is an integral part of the Semantic Web architecture. Most prior work on trust focuses on entity-centered issues such as authentication and reputation and does not take into...
Yolanda Gil, Donovan Artz
AIME
2005
Springer
15 years 9 months ago
AI Planning Technology as a Component of Computerised Clinical Practice Guidelines
The UK National Health Service (NHS) is currently undergoing an intensive review into the way patient care is designed, delivered and recorded. One important element of this is the...
Kirsty Bradbrook, Graham Winstanley, David Glasspo...