Sciweavers

873 search results - page 139 / 175
» Software Design As Framework Reuse: A Knowledge-Based Approa...
Sort
View
ICC
2007
IEEE
15 years 4 months ago
On the Risk-Based Operation of Mobile Attacks in Wireless Ad Hoc Networks
—In this paper we study the propagation of malicious software in wireless ad hoc networks under a probabilistic framework. We design topology control algorithms for the developme...
Vasileios Karyotis, Symeon Papavassiliou, Mary Gra...
ICEIS
1999
IEEE
15 years 2 months ago
Facilitating Organisational Activities Using Plans and Audits
Group Decision Support Systems (GDSS) present important limitations that constrain their usage in current organisations. The fundamental reason is the lack of integration in the c...
Carlos J. Costa, Tania Ho, Pedro Antunes
DOLAP
2005
ACM
14 years 11 months ago
Applying MDA to the development of data warehouses
Different modeling approaches have been proposed to overcome every design pitfall of the development of the different parts of a data warehouse (DW) system. However, they are all ...
Jose-Norberto Mazón, Juan Trujillo, Manuel ...
RTAS
2005
IEEE
15 years 3 months ago
Applying Sensitivity Analysis in Real-Time Distributed Systems
During real-world design of embedded real-time systems, it cannot be expected that all performance data required for scheduling analysis is fully available up front. In such situa...
Razvan Racu, Marek Jersak, Rolf Ernst
EMSOFT
2008
Springer
14 years 11 months ago
Energy efficient streaming applications with guaranteed throughput on MPSoCs
In this paper we present a design space exploration flow to achieve energy efficiency for streaming applications on MPSoCs while meeting the specified throughput constraints. The ...
Jun Zhu, Ingo Sander, Axel Jantsch