Sciweavers

575 search results - page 36 / 115
» A Trust Analysis Methodology for Pervasive Computing Systems
Sort
View
DATE
2010
IEEE
107views Hardware» more  DATE 2010»
14 years 24 days ago
Worst case delay analysis for memory interference in multicore systems
Abstract—Employing COTS components in real-time embedded systems leads to timing challenges. When multiple CPU cores and DMA peripherals run simultaneously, contention for access...
Rodolfo Pellizzoni, Andreas Schranzhofer, Jian-Jia...
BMCBI
2007
153views more  BMCBI 2007»
13 years 7 months ago
MPHASYS: a mouse phenotype analysis system
Background: Systematic, high-throughput studies of mouse phenotypes have been hampered by the inability to analyze individual animal data from a multitude of sources in an integra...
R. Brent Calder, Rudolf B. Beems, Harry van Steeg,...
COLCOM
2009
IEEE
14 years 12 days ago
Towards automatic privacy management in Web 2.0 with semantic analysis on annotations
— Sharing personal information and documents is pervasive in Web 2.0 environments, which creates the need for properly controlling shared data. Most existing authorization and po...
Nitya Vyas, Anna Cinzia Squicciarini, Chih-Cheng C...
IPPS
2006
IEEE
14 years 1 months ago
A hierarchical scheduling model for component-based real-time systems
In this paper, we propose a methodology for developing component-based real-time systems based on the concept of hierarchical scheduling. Recently, much work has been devoted to t...
José L. Lorente, Giuseppe Lipari, Enrico Bi...
HICSS
2003
IEEE
165views Biometrics» more  HICSS 2003»
14 years 29 days ago
Analysis of the Effectiveness of Global Virtual Teams in Software Engineering Projects
Global software development projects use virtual teams, which are primarily linked through computer and telecommunications technologies across national boundaries. Global Virtual ...
H. Keith Edwards, Varadharajan Sridhar