Many approaches have been developed for modeling the functional aspects of Web applications, but there is a lack of a modeling language for their architectural concerns. This paper...
The concept of context can be advantageously applied to the Computer-Supported Cooperative Work field. The term awareness has traditionally been used in this area without explicit ...
A common breach of network security is the class of attacks called Worm-virus. This paper proposes a language called Triton whose goal is to efficiently and effectively safeguard ...
Jangha Kim, Byungwook Song, Kanghee Lee, Sangwook ...
— Some electric power markets allow bidders to specify constraints on ramp rates for increasing or decreasing power production. We show in a small example that a bidder could use...
Abstract—This article discusses system-level techniques to optimize the power-performance trade-off in subthreshold circuits and presents a uniform platform for implementing ultr...