Sciweavers

1516 search results - page 146 / 304
» The Increasing Nvalue Constraint
Sort
View
EUROPAR
2008
Springer
14 years 11 months ago
Mapping Heterogeneous Distributed Applications on Clusters
Performance of distributed applications largely depends on the mapping of their components on the underlying architecture. On one mponent-based approaches provide an abstraction su...
Sylvain Jubertie, Emmanuel Melin, Jér&eacut...
DBSEC
2007
138views Database» more  DBSEC 2007»
14 years 11 months ago
A Spatio-temporal Role-Based Access Control Model
With the growing advancement of pervasive computing technologies, we are moving towards an era where spatio-temporal information will be necessary for access control. The use of su...
Indrakshi Ray, Manachai Toahchoodee
FECS
2007
142views Education» more  FECS 2007»
14 years 11 months ago
Adding Some Lab Time is Good, Adding More Must be Better: the Benefits and Barriers to Lab-Centric Courses
: This paper examines the benefits that can arise from increased use of labs in computer science instruction. While some use of labs is widespread in the earliest computer science ...
Nathaniel Titterton, Michael J. Clancy
ISIM
2007
14 years 11 months ago
Verification of Good Design Style of UML Models
Software architecture, and its behavior can be expressed as UML models. Models of complex systems can be also complex and hard to read – they may consists of hundreds of artifact...
Bogumila Hnatkowska
WCET
2008
14 years 11 months ago
Applying WCET Analysis at Architectural Level
Real-Time embedded systems must enforce strict timing constraints. In this context, achieving precise Worst Case Execution Time is a prerequisite to apply scheduling analysis and ...
Olivier Gilles, Jérôme Hugues