Sciweavers

222 search results - page 31 / 45
» Specification of Role-Based Interactions Components in Multi...
Sort
View
JCP
2008
116views more  JCP 2008»
14 years 11 months ago
Formal Verification and Visualization of Security Policies
Verified and validated security policies are essential components of high assurance computer systems. The design and implementation of security policies are fundamental processes i...
Luay A. Wahsheh, Daniel Conte de Leon, Jim Alves-F...
ASPDAC
2010
ACM
233views Hardware» more  ASPDAC 2010»
14 years 9 months ago
Computer-aided recoding for multi-core systems
- The design of embedded computing systems faces a serious productivity gap due to the increasing complexity of their hardware and software components. One solution to address this...
Rainer Dömer
IJACTAICIT
2010
146views more  IJACTAICIT 2010»
14 years 9 months ago
Modeling and Simulation of a Pervasive Multimodal Multimedia Computing System for Visually-Impaired Users
Using multimodality in a computing system is advantageous in the sense that it makes computing more accessible to a wide range of users including those with impairments. Our work ...
Ali Awde, Moeiz Miraoui, Chakib Tadj, Yacine Belli...
ICIS
2000
15 years 1 months ago
Managing customer turnover in online services: a systems thinking approach
Even as they enjoy impressive growth, one of the major challenges facing providers of online services is a high rate of customer turnover. It has adverse impacts on business perfo...
Amitava Dutta
EWSA
2006
Springer
15 years 3 months ago
Modes for Software Architectures
Abstract. Modern systems are heterogeneous, geographically distributed and highly dynamic since the communication topology can vary and the components can, at any moment, connect t...
Dan Hirsch, Jeff Kramer, Jeff Magee, Sebasti&aacut...