Sciweavers

1054 search results - page 196 / 211
» Models for automatic generation of safety-critical real-time...
Sort
View
WSC
2000
14 years 10 months ago
3D visualization of simulated construction operations
Significant advances have been made in the field of construction process modeling. However, no convenient graphical support tools exist that can depict the modeled operations in 3...
Vineet R. Kamat, Julio C. Martínez
ISPASS
2009
IEEE
15 years 4 months ago
Machine learning based online performance prediction for runtime parallelization and task scheduling
—With the emerging many-core paradigm, parallel programming must extend beyond its traditional realm of scientific applications. Converting existing sequential applications as w...
Jiangtian Li, Xiaosong Ma, Karan Singh, Martin Sch...
ACNS
2008
Springer
138views Cryptology» more  ACNS 2008»
15 years 3 months ago
Traceable and Retrievable Identity-Based Encryption
Abstract. Very recently, the concept of Traceable Identity-based Encryption (IBE) scheme (or Accountable Authority Identity based Encryption scheme) was introduced in Crypto 2007. ...
Man Ho Au, Qiong Huang, Joseph K. Liu, Willy Susil...
CODES
2006
IEEE
15 years 3 months ago
Creation and utilization of a virtual platform for embedded software optimization: : an industrial case study
Virtual platform (ViP), or ESL (Electronic System Level) simulation model, is one of the most widely renowned system level design techniques. In this paper, we present a case stud...
Sungpack Hong, Sungjoo Yoo, Sheayun Lee, Sangwoo L...
73
Voted
WWW
2005
ACM
15 years 10 months ago
Design for verification for asynchronously communicating Web services
We present a design for verification approach to developing reliable web services. We focus on composite web services which consist of asynchronously communicating peers. Our goal...
Aysu Betin-Can, Tevfik Bultan, Xiang Fu