Sciweavers

3555 search results - page 138 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
111
Voted
IFM
2004
Springer
104views Formal Methods» more  IFM 2004»
15 years 7 months ago
Linking CSP-OZ with UML and Java: A Case Study
Abstract. We describe how CSP-OZ, an integrated formal method combining the process algebra CSP with the specification language Object-Z, can be linked to standard software engine...
Michael Möller, Ernst-Rüdiger Olderog, H...
TON
2010
107views more  TON 2010»
14 years 8 months ago
Leveraging Dynamic Spare Capacity in Wireless Systems to Conserve Mobile Terminals' Energy
In this paper we study several ways in which mobile terminals can backoff on their uplink transmit power in order to extend battery lifetimes. This is particularly effective when a...
Hongseok Kim, Gustavo de Veciana
SIGMOD
2006
ACM
107views Database» more  SIGMOD 2006»
16 years 1 months ago
Relaxed space bounding for moving objects: a case for the buddy tree
Rapid advancements in positioning systems and wireless communications enable accurate tracking of continuously moving objects. This development poses new challenges to database te...
Shuqiao Guo, Zhiyong Huang, H. V. Jagadish, Beng C...
HICSS
2006
IEEE
105views Biometrics» more  HICSS 2006»
15 years 7 months ago
The Impact of Design Moves on Platform Adoption: The Case of Microsoft Windows OS
How soon will firms form alliances with a platform provider? What factors impact the decision and the speed with which firms first move into partnerships with a platform provider ...
Xiang Liu, Chi-Hyon Lee, Bala Iyer
RTAS
2005
IEEE
15 years 7 months ago
Improving WCET by Optimizing Worst-Case Paths
It is advantageous to perform compiler optimizations to lower the WCET of a task since tasks with lower WCETs are easier to schedule and more likely to meet their deadlines. Compi...
Wankang Zhao, William C. Kreahling, David B. Whall...