Sciweavers

1989 search results - page 106 / 398
» Integrity Management in Component Based Systems
Sort
View
ISAS
2004
Springer
15 years 10 months ago
On Enhancing the Robustness of Commercial Operating Systems
A ubiquitous computing system derives its operations from the collective interactions of its constituent components. Consequently, a robust ubiquitous system entails that the discr...
Andréas Johansson, Adina Sarbu, Arshad Jhum...
ICCD
2002
IEEE
152views Hardware» more  ICCD 2002»
16 years 1 months ago
Register Binding Based Power Management for High-level Synthesis of Control-Flow Intensive Behaviors
A circuit or circuit component that does not contain any spurious switching activity, i.e., activity that is not required by its specified functionality, is called perfectly power...
Lin Zhong, Jiong Luo, Yunsi Fei, Niraj K. Jha
PDC
2004
ACM
15 years 10 months ago
From small scale to large scale user participation: a case study of participatory design in e-government systems
Most experiments with participative design are with small scale, stand alone and not very strategic applications of ICT in organizations. However, modern ICT applications are incr...
Anne-Marie Oostveen, Peter Van den Besselaar
SIGOPSE
1998
ACM
15 years 8 months ago
Distributed virtual machines: a system architecture for network computing
Modern virtual machines, such as Java and Inferno, are emerging as network computing s. While these virtual machines provide higher-level abstractions and more sophisticated servi...
Emin Gün Sirer, Robert Grimm, Brian N. Bersha...
ATAL
2005
Springer
15 years 10 months ago
T-Man: Gossip-Based Overlay Topology Management
Overlay topology plays an important role in P2P systems. Topology serves as a basis for achieving functions such as routing, searching and information dissemination, and it has a m...
Márk Jelasity, Özalp Babaoglu