Sciweavers

977 search results - page 29 / 196
» Soft Constraints for Security
Sort
View
PATMOS
2007
Springer
15 years 4 months ago
Soft Error-Aware Power Optimization Using Gate Sizing
—Power consumption has emerged as the premier and most constraining aspect in modern microprocessor and application-specific designs. Gate sizing has been shown to be one of the...
Foad Dabiri, Ani Nahapetian, Miodrag Potkonjak, Ma...
KBS
2007
103views more  KBS 2007»
14 years 9 months ago
A reusable commitment management service using Semantic Web technology
Commitment management is a key issue in service-provisioning in the context of virtual organisations (VOs). A service-provider — which may be a single agent acting within an orga...
Alun D. Preece, Stuart Chalmers, Craig McKenzie
CONSTRAINTS
2008
117views more  CONSTRAINTS 2008»
14 years 10 months ago
Domain Specific High-Level Constraints for User Interface Layout
We present the Auckland Layout Model (ALM), a constraint-based technique for specifying 2D layout as it is used for arranging the controls in a GUI. Most GUI frameworks offer layo...
Christof Lutteroth, Robert Strandh, Gerald Weber
ISQED
2008
IEEE
186views Hardware» more  ISQED 2008»
15 years 4 months ago
Reliability-Aware Optimization for DVS-Enabled Real-Time Embedded Systems
—Power and energy consumption has emerged as the premier and most constraining aspect in modern computational systems. Dynamic Voltage Scheduling (DVS) has been provably one of t...
Foad Dabiri, Navid Amini, Mahsan Rofouei, Majid Sa...
OOPSLA
2005
Springer
15 years 3 months ago
Associated types and constraint propagation for mainstream object-oriented generics
Jaakko Järvi, Jeremiah Willcock, Andrew Lumsd...