Sciweavers

1831 search results - page 280 / 367
» Time Constraints in Workflow Systems
Sort
View
ICSM
2002
IEEE
15 years 4 months ago
Maintaining Software with a Security Perspective
Testing for software security is a lengthy, complex and costly process. Currently, security testing is done using penetration analysis and formal verification of security kernels....
Kanta Jiwnani, Marvin V. Zelkowitz
85
Voted
CDC
2009
IEEE
211views Control Systems» more  CDC 2009»
15 years 4 months ago
On stability of linear switched differential algebraic equations
Abstract— This paper studies linear switched differential algebraic equations (DAEs), i.e., systems defined by a finite family of linear DAE subsystems and a switching signal t...
Daniel Liberzon, Stephan Trenn
ISLPED
2000
ACM
77views Hardware» more  ISLPED 2000»
15 years 4 months ago
A recursive algorithm for low-power memory partitioning
Memory-processor integration o ers new opportunities for reducing the energy of a system. In the case of embedded systems, one solution consists of mapping the most frequently acc...
Luca Benini, Alberto Macii, Massimo Poncino
IPPS
1999
IEEE
15 years 4 months ago
Exploiting Application Tunability for Efficient, Predictable Parallel Resource Management
Parallel computing is becoming increasing central and mainstream, driven both by the widespread availability of commodity SMP and high-performance cluster platforms, as well as th...
Fangzhe Chang, Vijay Karamcheti, Zvi M. Kedem
MM
1996
ACM
120views Multimedia» more  MM 1996»
15 years 4 months ago
Negotiation for Automated Generation of Temporal Multimedia Presentations
Creating high-quality multimediapresentationsrequiresmuch skill, time, and effort. This is particularly true when temporal media, such as speech and animation, are involved. We de...
Mukesh Dalal, Steven Feiner, Kathleen McKeown, Shi...