Sciweavers

674 search results - page 6 / 135
» Resource Bound Certification
Sort
View
AIPS
2007
14 years 11 months ago
Bounding the Resource Availability of Activities with Linear Resource Impact
We introduce the Linear Resource Temporal Network (LRTN), which consists of activities that consume or produce a resource, subject to absolute and relative metric temporal constra...
Jeremy Frank, Paul H. Morris
SAC
2002
ACM
14 years 9 months ago
Proxy-based security protocols in networked mobile devices
We describe a resource discovery and communication system designed for security and privacy. All objects in the system, e.g., appliances, wearable gadgets, software agents, and us...
Matt Burnside, Dwaine E. Clarke, Todd Mills, Andre...
SOPR
2008
60views more  SOPR 2008»
14 years 9 months ago
Human resources based improvement strategies - the learning factor
: Processes usually are defined according to underlying standards (ISO 15504, ESA ECSS, ISO 9001, ...) and are described with process steps to be performed by roles and producing r...
Richard Messnarz, Damjan Ekert, Michael Reiner, Ge...
SIGUCCS
2003
ACM
15 years 2 months ago
Training program growth...: from flat line to pulsating
IT Training and Communications is a division of Information Technology Services (ITS), which provides computer application training for the faculty and staff at Saint Louis Univer...
Sue A. Moore
SAC
2008
ACM
14 years 9 months ago
Removing useless variables in cost analysis of Java bytecode
Automatic cost analysis has interesting applications in the context of verification and certification of mobile code. For instance, the code receiver can use cost information in o...
Elvira Albert, Puri Arenas, Samir Genaim, Germ&aac...