Sciweavers

3463 search results - page 647 / 693
» Modeling and executing master-worker applications in compone...
Sort
View
ECIS
2001
14 years 11 months ago
Structuration Theory and Information System Development - Frameworks for Practice
Giddens' structuration theory (ST) offers an account of social life in terms of social practices developing and changing over time and space, which makes no attempt to direct...
Jeremy Rose, Rens Scheepers
ESORICS
2010
Springer
14 years 10 months ago
Secure Code Update for Embedded Devices via Proofs of Secure Erasure
Remote attestation is the process of verifying internal state of a remote embedded device. It is an important component of many security protocols and applications. Although previo...
Daniele Perito, Gene Tsudik
JMLR
2006
131views more  JMLR 2006»
14 years 9 months ago
On Representing and Generating Kernels by Fuzzy Equivalence Relations
Kernels are two-placed functions that can be interpreted as inner products in some Hilbert space. It is this property which makes kernels predestinated to carry linear models of l...
Bernhard Moser
JSW
2007
81views more  JSW 2007»
14 years 9 months ago
User-Controlled Reflection on Join Points
Abstract—All aspect orientation languages provide a onesize-fits-all methodology for reflection on join points. However, the amount of resources necessary for this approach is to...
Piërre van de Laar, Rob Golsteijn
PDP
2010
IEEE
14 years 8 months ago
FTDS: Adjusting Virtual Computing Resources in Threshing Cases
—In the virtual execution environment, dynamic computing resource adjustment technique, configuring the computing resource of virtual machines automatically according to the actu...
Jian Huang, Hai Jin, Kan Hu, Zhiyuan Shao