Sciweavers

1399 search results - page 244 / 280
» A Component Model for Control-Intensive Distributed Embedded...
Sort
View
FM
2006
Springer
153views Formal Methods» more  FM 2006»
13 years 11 months ago
Formal Methods and Cryptography
Security-critical systems are an important application area for formal methods. However, such systems often contain cryptographic subsystems. The natural definitions of these subsy...
Michael Backes, Birgit Pfitzmann, Michael Waidner
ICDCS
1991
IEEE
13 years 11 months ago
Supporting the development of network programs
of ‘‘network computers’’ is inherently lessAbstract predictable than that of more traditional distributed memory systems, such as hypercubes [22], since both theFor computa...
Bernd Bruegge, Peter Steenkiste
IIWAS
2008
13 years 9 months ago
Application framework with demand-driven mashup for selective browsing
Abstract: We are developing a new mashup framework for creating flexible applications in which users can selectively browse through mashup items. The framework provides GUI compone...
Sohei Ikeda, Takakazu Nagamine, Tomio Kamada
IPSN
2007
Springer
14 years 1 months ago
Health monitoring of civil infrastructures using wireless sensor networks
A Wireless Sensor Network (WSN) for Structural Health Monitoring (SHM) is designed, implemented, deployed and tested on the 4200ft long main span and the south tower of the Golden...
Sukun Kim, Shamim Pakzad, David E. Culler, James D...
RTCSA
2009
IEEE
14 years 2 months ago
Managing Imprecise Worst Case Execution Times on DVFS Platforms
Abstract—Although energy-efficient real-time task scheduling has attracted a lot of attention in the past decade, most existing results assumed deterministic execution lengths f...
Vandy Berten, Chi-Ju Chang, Tei-Wei Kuo