Sciweavers

1863 search results - page 105 / 373
» Load-Reuse Analysis: Design and Evaluation
Sort
View
94
Voted
JPDC
1998
131views more  JPDC 1998»
14 years 10 months ago
Modeling Free-Space Optical k-ary n-Cube Wormhole Networks
This paper presents an optical interconnect model for k-ary n-cube network topologies based on freespace analysis. This model integrates relevant parameters inherent to optics wit...
Mongkol Raksapatcharawong, Timothy Mark Pinkston
ACL
1998
14 years 11 months ago
Discourse Cues for Broadcast News Segmentation
This paper describes the design and application of time-enhanced, finite state models of discourse cues to the automated segmentation of broadcast news. We describe our analysis o...
Mark T. Maybury
72
Voted
SIGMETRICS
2006
ACM
116views Hardware» more  SIGMETRICS 2006»
15 years 4 months ago
Applying architectural vulnerability Analysis to hard faults in the microprocessor
In this paper, we present a new metric, Hard-Fault Architectural Vulnerability Factor (H-AVF), to allow designers to more effectively compare alternate hard-fault tolerance scheme...
Fred A. Bower, Derek Hower, Mahmut Yilmaz, Daniel ...
JWSR
2007
106views more  JWSR 2007»
14 years 10 months ago
Architecture-Driven Service Discovery for Service Centric Systems
: Service discovery has been recognised as an important aspect in the development of service centric systems, i.e., software systems which deploy web services. To develop such syst...
Alexander Kozlenkov, George Spanoudakis, Andrea Zi...
92
Voted
ASE
2007
121views more  ASE 2007»
14 years 10 months ago
Computer-aided Support for Secure Tropos
In earlier work, we have introduced Secure Tropos, a requirements engineering methodology that extends the Tropos methodology and is intended for the design and analysis of securit...
Fabio Massacci, John Mylopoulos, Nicola Zannone