Sciweavers

1941 search results - page 106 / 389
» The architecture design of a cross-domain context management...
Sort
View
SAMOS
2004
Springer
15 years 6 months ago
Constraints Derivation and Propagation for Large-Scale Embedded Systems Exploration
Abstract— The translation of user requirements to system constraints and parameters during an exploration exercise is a hard problem, especially in the context of large scale emb...
Laurentiu Nicolae, Ed F. Deprettere
ICFEM
2003
Springer
15 years 6 months ago
Formal Proof of a Polychronous Protocol for Loosely Time-Triggered Architectures
The verification of safety critical systems has become an area of increasing importance in computer science. The notion of reactive system has emerged to concentrate on problems r...
Mickaël Kerboeuf, David Nowak, Jean-Pierre Ta...
HICSS
1999
IEEE
88views Biometrics» more  HICSS 1999»
15 years 5 months ago
Facilitating User-System Interaction: The GAIA Interaction Agent
This paper presents the identification, design and implementation of a user interface to a brokerage system and the conceptual architecture and functional behaviour of an intellig...
Panayiotis Koutsabasis, John Darzentas, Thomas Spy...
CHI
2011
ACM
14 years 5 months ago
Homebrew databases: complexities of everyday information management in nonprofit organizations
Many people manage a complex assortment of digital information in their lives. Volunteer coordinators at nonprofit organizations are no exception; they collectively manage informa...
Amy Voida, Ellie Harmon, Ban Al-Ani
WWW
2003
ACM
16 years 2 months ago
SHOCK: communicating with computational messages and automatic private profiles
A computationally enhanced message contains some embedded programmatic components that are interpreted and executed automatically upon receipt. Unlike ordinary text email or insta...
Rajan M. Lukose, Eytan Adar, Joshua R. Tyler, Caes...