Sciweavers

1620 search results - page 180 / 324
» Use Case Level Pointcuts
Sort
View
ITRUST
2005
Springer
15 years 5 months ago
Can We Manage Trust?
The term trust management suggests that trust can be managed, for example by creating trust, by assessing trustworthiness, or by determining optimal decisions based on specific le...
Audun Jøsang, Claudia Keser, Theodosis Dimi...
CASES
2003
ACM
15 years 4 months ago
AES and the cryptonite crypto processor
CRYPTONITE is a programmable processor tailored to the needs of crypto algorithms. The design of CRYPTONITE was based on an in-depth application analysis in which standard crypto ...
Dino Oliva, Rainer Buchty, Nevin Heintze
CDC
2009
IEEE
231views Control Systems» more  CDC 2009»
15 years 4 months ago
Design of observer-based controllers for LPV systems with unknown parameters
— Output-based feedback control of LPV systems is an important problem, as in practice it is rarely the case that the full state variable is available for feedback. In this paper...
W. P. M. H. Heemels, Jamal Daafouz, Gilles Milleri...
HPCC
2009
Springer
15 years 4 months ago
Grid Network Dimensioning by Modeling the Deadline Constrained Bulk Data Transfers
—Grid applications need to move large amounts of data between distributed resources within deterministic time frames. In most cases it is possible to specify the volume and the d...
Kashif Munir, Pascale Vicat-Blanc Primet, Michael ...
ICCS
2001
Springer
15 years 4 months ago
Optimizing Sparse Matrix Computations for Register Reuse in SPARSITY
Abstract. Sparse matrix-vector multiplication is an important computational kernel that tends to perform poorly on modern processors, largely because of its high ratio of memory op...
Eun-Jin Im, Katherine A. Yelick