Sciweavers

8503 search results - page 1373 / 1701
» Secure Software Architectures
Sort
View
109
Voted
ICNS
2006
IEEE
15 years 7 months ago
Service Level Agreement Management with Adaptive Coordination
Service Level Agreement Management in the telecommunications domain consists of a set of mechanisms for provisioning and monitoring services according to requirements given by eit...
Dominic A. P. Greenwood, Giosuè Vitaglione,...
128
Voted
IJCNN
2006
IEEE
15 years 7 months ago
A Connectionist Approach to Speech Understanding
— This paper argues that connectionist systems are a good approach to implement a speech understanding computational model. In this direction, we propose SUM, a Speech Understand...
Daniel Nehme Müller, Mozart Lemos de Siqueira...
112
Voted
ISORC
2006
IEEE
15 years 7 months ago
An Infrastructure for Adaptive Fault Tolerance on FT-CORBA
The fault tolerance provided by FT-CORBA is basically static, that is, once the fault tolerance properties of a group of replicated processes defined, they cannot be modified in r...
Lau Cheuk Lung, Fábio Favarim, Giuliana Tei...
107
Voted
ISORC
2006
IEEE
15 years 7 months ago
Complexity Management for Composable Real-Time Systems
Embedded real-time systems are becoming increasingly complex due to ever increasing size and functionality so that complexity management is of growing importance, especially in de...
Bernhard Rumpler
113
Voted
RSP
2006
IEEE
102views Control Systems» more  RSP 2006»
15 years 7 months ago
Rapid Resource-Constrained Hardware Performance Estimation
In a hardware-software co-design environment, an application is partitioned into modules. Each module is then mapped either to software or to hardware. The mapping process is driv...
Basant Kumar Dwivedi, Arun Kejariwal, M. Balakrish...
« Prev « First page 1373 / 1701 Last » Next »