Sciweavers

2562 search results - page 345 / 513
» The Use of B2B Process Standards: A Case Study
Sort
View
DATE
2008
IEEE
101views Hardware» more  DATE 2008»
15 years 4 months ago
A Game-Theoretic Approach to Real-Time System Testing
This paper presents a game-theoretic approach to the testing of uncontrollable real-time systems. By modelling the systems with Timed I/O Game Automata and specifying the test pur...
Alexandre David, Kim Guldstrand Larsen, Shuhao Li,...
IPPS
2007
IEEE
15 years 4 months ago
Challenges in Executing Data Intensive Biometric Workloads on a Desktop Grid
Desktop grids have traditionally focused on executing computation intensive workloads. Can they also be used to execute data-intensive workloads? To answer this question, we prese...
Christopher Moretti, Timothy C. Faltemier, Douglas...
77
Voted
QSIC
2007
IEEE
15 years 4 months ago
Model Checking Security Pattern Compositions
Security patterns capture best practice on secure software design and development. They document typical solutions to security problems. To ensure security, large software system ...
Jing Dong, Tu Peng, Yajing Zhao
VTC
2007
IEEE
152views Communications» more  VTC 2007»
15 years 4 months ago
Iterative (TURBO) IQ Imbalance Estimation and Correction in BICM-ID for Flat Fading Channels
—TURBO principle has been exploited gainfully to implement many receiver functions. RF front-end impairments are a serious issue in high spectral efficient applications. IQ imba...
Raghunath Cherukuri, Poras T. Balsara
EMISA
2007
Springer
15 years 4 months ago
Viewpoint-based Meta Model Engineering
: Work systems are complex artifacts that address the concerns of a large and diverse group of stakeholders. These concerns must be reflected in the models which are created as use...
Stephan Kurpjuweit, Robert Winter