Sciweavers

2513 search results - page 133 / 503
» Tamper-Tolerant Software: Modeling and Implementation
Sort
View
CODES
2004
IEEE
15 years 1 months ago
Analytical models for leakage power estimation of memory array structures
There is a growing need for accurate power models at the system level. Memory structures such as caches, Branch Target Buffers (BTBs), and register files occupy significant area i...
Mahesh Mamidipaka, Kamal S. Khouri, Nikil D. Dutt,...
SERP
2010
14 years 7 months ago
The Viability of UML Models in Small Web Applications
As the use of online business systems increase so does the need to produce more efficient and less error prone web based Modeling is a core abstraction mechanism used to manage co...
Jason Dudley, Devon Simmonds
ICSEA
2006
IEEE
15 years 4 months ago
Extracting Simulation Models from Complex Embedded Real-Time Systems
A modeling process is presented for extracting timingaccurate simulation models from complex embedded realtime systems. The process is supported by two complementary methods for t...
Johan Andersson, Joel Huselius, Christer Norstr&ou...
ICSE
1998
IEEE-ACM
15 years 2 months ago
Modeling and Analysis of a Virtual Reality System with Time Petri Nets
The design, implementation, and testing of virtual environments is complicated by the concurrency and realtime features of these systems. Therefore, the development of formal meth...
Rajesh Mascarenhas, Dinkar Karumuri, Ugo A. Buy, R...
BPM
2007
Springer
124views Business» more  BPM 2007»
15 years 2 months ago
SAP WebFlow Made Configurable: Unifying Workflow Templates into a Configurable Model
To facilitate the implementation of workflows, enterprise and workflow system vendors typically provide sets of workflow templates for their software. Each of these templates depic...
Florian Gottschalk, Wil M. P. van der Aalst, Moniq...