Sciweavers

11603 search results - page 2260 / 2321
» Securing Embedded Systems
Sort
View
BMCBI
2004
173views more  BMCBI 2004»
15 years 1 months ago
d-matrix - database exploration, visualization and analysis
Background: Motivated by a biomedical database set up by our group, we aimed to develop a generic database front-end with embedded knowledge discovery and analysis features. A maj...
Dominik Seelow, Raffaello Galli, Siegrun Mebus, Ha...
VLDB
2002
ACM
108views Database» more  VLDB 2002»
15 years 1 months ago
Energy-performance trade-offs for spatial access methods on memory-resident data
Abstract. The proliferation of mobile and pervasive computing devices has brought energy constraints into the limelight. Energy-conscious design is important at all levels of syste...
Ning An, Sudhanva Gurumurthi, Anand Sivasubramania...
RE
2008
Springer
15 years 1 months ago
Examining the Relationships between Performance Requirements and "Not a Problem" Defect Reports
Missing or imprecise requirements can lead stakeholders to make incorrect assumptions. A "Not a Problem" defect report (NaP) describes a software behavior that a stakeho...
Chih-Wei Ho, Laurie Williams, Brian Robinson
LICS
2010
IEEE
15 years 12 days ago
Polarity and the Logic of Delimited Continuations
Abstract—Polarized logic is the logic of values and continuations, and their interaction through continuation-passing style. The main limitations of this logic are the limitation...
Noam Zeilberger
ACSD
2010
IEEE
251views Hardware» more  ACSD 2010»
15 years 14 hour ago
Modular Interpretation of Heterogeneous Modeling Diagrams into Synchronous Equations Using Static Single Assignment
Abstract--The ANR project SPaCIFY develops a domainspecific programming environment, Synoptic, to engineer embedded software for space applications. Synoptic is an Eclipse-based mo...
Jean-Pierre Talpin, Julien Ouy, Thierry Gautier, L...
« Prev « First page 2260 / 2321 Last » Next »