Sciweavers

1885 search results - page 98 / 377
» Optimization of Component Connections for an Embedded Compon...
Sort
View
VLDB
2002
ACM
165views Database» more  VLDB 2002»
14 years 9 months ago
Chip-Secured Data Access: Confidential Data on Untrusted Servers
The democratization of ubiquitous computing (access data anywhere, anytime, anyhow), the increasing connection of corporate databases to the Internet and the today's natural ...
Luc Bouganim, Philippe Pucheral
ATAL
2008
Springer
14 years 12 months ago
An agent-based electrical power market
This demonstration shows an agent-based model for the electricity power market, in which the optimal power flow is determined in a bottom-up fashion. Here, each agent controls a s...
Jaime Cerda Jacobo, David De Roure, Enrico H. Gerd...
ITCC
2005
IEEE
15 years 3 months ago
Misuse Case-Based Design and Analysis of Secure Software Architecture
This paper presents an approach to the architectural design and analysis of secure software systems based on the system requirements elicited in the form of use cases and misuse c...
Joshua J. Pauli, Dianxiang Xu
SIAMCO
2010
153views more  SIAMCO 2010»
14 years 4 months ago
Optimal Control for an Elliptic System with Polygonal State Constraints
This work is devoted to stationary optimal control problems with polygonal constraints on the components of the state. Existence of Lagrange multipliers, of different regularity, i...
Karl Kunisch, Kewei Liang, Xiliang Lu
SDL
2007
192views Hardware» more  SDL 2007»
14 years 11 months ago
OpenComRTOS: An Ultra-Small Network Centric Embedded RTOS Designed Using Formal Modeling
Abstract. OpenComRTOS is one of the few Real-Time Operating Systems (RTOS) for embedded systems that was developed using formal modeling techniques. The goal was to obtain a proven...
Eric Verhulst, Gjalt G. de Jong