Sciweavers

3516 search results - page 660 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
ERCIMDL
2005
Springer
99views Education» more  ERCIMDL 2005»
15 years 5 months ago
Management and Sharing of Bibliographies
Abstract. Managing bibliographic data is a requirement for many researchers, and in the group setting within which the majority of research takes place, the managing and sharing of...
Erik Wilde, Sai Anand, Petra Zimmermann
JWSR
2007
104views more  JWSR 2007»
14 years 11 months ago
Dealing with Scale and Adaptation of Global Web Services Management
Service Oriented Architectures (SOA) are becoming the prevalent approach for realizing modern services and systems. SOA offers superior support for autonomy (decoupling) and heter...
William Vambenepe, Carol Thompson, Vanish Talwar, ...
ISI
2006
Springer
14 years 11 months ago
Entity Workspace: An Evidence File That Aids Memory, Inference, and Reading
An intelligence analyst often needs to keep track of more facts than can be held in human memory. As a result, analysts use a notebook or evidence file to record facts learned so f...
Eric A. Bier, Edward W. Ishak, Ed Chi
SENSYS
2009
ACM
15 years 6 months ago
Darjeeling, a feature-rich VM for the resource poor
The programming and retasking of sensor nodes could benefit greatly from the use of a virtual machine (VM) since byte code is compact, can be loaded on demand, and interpreted on...
Niels Brouwers, Koen Langendoen, Peter Corke
RTCSA
2003
IEEE
15 years 5 months ago
An Approximation Algorithm for Broadcast Scheduling in Heterogeneous Clusters
Network of workstation (NOW) is a cost-effective alternative to massively parallel supercomputers. As commercially available off-theshelf processors become cheaper and faster, it...
Pangfeng Liu, Da-Wei Wang, Yi-Heng Guo