Sciweavers

3686 search results - page 698 / 738
» An Approach to a Trustworthy System Architecture Using Virtu...
Sort
View
HICSS
2007
IEEE
148views Biometrics» more  HICSS 2007»
14 years 2 months ago
A Survey of B2B Methodologies and Technologies: From Business Models towards Deployment Artifacts
Abstract— In recent years business-to-business (B2B) ecommerce has been subject to major rethinking. A paradigm shift from document centric file-based interchange of business in...
Jürgen Dorn, Christoph Grün, Hannes Wert...
HICSS
2007
IEEE
124views Biometrics» more  HICSS 2007»
14 years 2 months ago
POSAML: A Visual Modeling Framework for Middleware Provisioning
Effective provisioning of next generation distributed applications hosted on diverse middleware platforms incurs significant challenges due to the applications’ growing complex...
Dimple Kaul, Arundhati Kogekar, Aniruddha S. Gokha...
ICC
2007
IEEE
136views Communications» more  ICC 2007»
14 years 2 months ago
On the Approximation of the Linear Combination of Log-Normal RVs via Pearson Type IV Distribution: Application to UWB Performanc
— Approximating the sum of Log–Normal random variables (RVs) is a long–standing open issue, in the old and recent literature, and many approaches have been proposed to deal w...
Marco Di Renzo, Fabio Graziosi, Fortunato Santucci
RTAS
2007
IEEE
14 years 2 months ago
Soft Real-Time Scheduling on Performance Asymmetric Multicore Platforms
This paper discusses an approach for supporting soft realtime periodic tasks in Linux on performance asymmetric multicore platforms (AMPs). Such architectures consist of a large n...
John M. Calandrino, Dan P. Baumberger, Tong Li, Sc...
COMSWARE
2006
IEEE
14 years 1 months ago
Utilizing network features for privacy violation detection
Privacy, its violations and techniques to circumvent privacy violation have grabbed the centre-stage of both academia and industry in recent months. Corporations worldwide have be...
Jaijit Bhattacharya, Rajanish Dass, Vishal Kapoor,...