Sciweavers

177 search results - page 18 / 36
» Access Control Based on Execution History
Sort
View
VTS
2007
IEEE
103views Hardware» more  VTS 2007»
14 years 1 months ago
At-Speed Testing of Core-Based System-on-Chip Using an Embedded Micro-Tester
In SoC designs, limited test access to internal cores, lowcost external tester’s lack of accuracy and slow frequencies make application of at-speed tests impractical. Therefore,...
Matthieu Tuna, Mounir Benabdenbi, Alain Greiner
VLDB
1994
ACM
84views Database» more  VLDB 1994»
13 years 11 months ago
A Transaction Replication Scheme for a Replicated Database with Node Autonomy
Many proposed protocols for replicated databases consider centralized control of each transaction so that given a transaction, some site will monitor the remote data access and tr...
Ada Wai-Chee Fu, David Wai-Lok Cheung
EWSA
2004
Springer
14 years 28 days ago
Generation and Enactment of Controllers for Business Architectures Using MDA
Model Driven Architecture (MDA) is an initiative of the OMG in which the software development process is driven by various software-related models describing the software to be gen...
Günter Graw, Peter Herrmann
ENTCS
2008
142views more  ENTCS 2008»
13 years 7 months ago
An Open System Operational Semantics for an Object-Oriented and Component-Based Language
Object orientation and component-based development have both proven useful for the elaboration of open distributed systems. These paradigms are offered by the Creol language. Creo...
Jasmin Christian Blanchette, Olaf Owe
TMC
2010
386views more  TMC 2010»
13 years 5 months ago
Design, Realization, and Evaluation of xShare for Impromptu Sharing of Mobile Phones
—Mobile phones are truly personal devices loaded with personal data such as photos, contacts, and call history. Yet it is often necessary or desirable to share our phones with ot...
Yunxin Liu, Ahmad Rahmati, Hyukjae Jang, Yuanhe Hu...