Sciweavers

824 search results - page 124 / 165
» Model-Based Monitoring of Dynamic Systems
Sort
View
ICSE
2010
IEEE-ACM
15 years 1 months ago
Requirements reflection: requirements as runtime entities
Computational reflection is a well-established technique that gives a program the ability to dynamically observe and possibly modify its behaviour. To date, however, reflection is...
Nelly Bencomo, Jon Whittle, Peter Sawyer, Anthony ...
ISPE
2003
15 years 1 months ago
Application of data mining and intelligent agent technologies to concurrent engineering
: Software agent technology has matured enough to produce intelligent agents, which can be used to control a large number of concurrent engineering tasks. Multi-agent systems are c...
Pericles A. Mitkas, Andreas L. Symeonidis, Dionisi...
FPL
2006
Springer
140views Hardware» more  FPL 2006»
15 years 3 months ago
A Thermal Management and Profiling Method for Reconfigurable Hardware Applications
Given large circuit sizes, high clock frequencies, and possibly extreme operating environments, Field Programmable Gate Arrays (FPGAs) are capable of heating beyond their designed...
Phillip H. Jones, John W. Lockwood, Young H. Cho
ACSC
2006
IEEE
15 years 6 months ago
SPiKE: engineering malware analysis tools using unobtrusive binary-instrumentation
Malware — a generic term that encompasses viruses, trojans, spywares and other intrusive code — is widespread today. Malware analysis is a multi-step process providing insight...
Amit Vasudevan, Ramesh Yerraballi
CBMS
2008
IEEE
15 years 6 months ago
Behavior-Based Access Control for Distributed Healthcare Environment
Privacy and security are critical requirements for using patient profiles in distributed healthcare environments. The amalgamation of new information technology with traditional ...
Mohammad H. Yarmand, Kamran Sartipi, Douglas G. Do...