Sciweavers

401 search results - page 14 / 81
» Analysis of discharge techniques for multiple battery system...
Sort
View
ACISP
2005
Springer
14 years 1 months ago
Security Analysis and Fix of an Anonymous Credential System
Anonymous credentials are an important privacy-enhancing technique that allows users to convince a service provider of their legitimacy for service accesses in an anonymous manner....
Yanjiang Yang, Feng Bao, Robert H. Deng
GECCO
2004
Springer
148views Optimization» more  GECCO 2004»
14 years 26 days ago
A Multi-objective Approach to Configuring Embedded System Architectures
Portable embedded systems are being driven by consumer demands to be thermally efficient, perform faster, and have longer battery life. To design such a system, various hardware un...
James Northern III, Michael A. Shanblatt
SG
2005
Springer
14 years 28 days ago
Visualization Tree, Multiple Linked Analytical Decisions
In this paper we tackle the main problem presented by the majority of Information Visualization techniques, that is, the limited number of data items that can be visualized simulta...
José Fernando Rodrigues Jr., Agma J. M. Tra...
RTAS
2008
IEEE
14 years 1 months ago
Schedulability Analysis of MSC-based System Models
Message Sequence Charts (MSCs) are widely used for describing interaction scenarios between the components of a distributed system. Consequently, worst-case response time estimati...
Lei Ju, Abhik Roychoudhury, Samarjit Chakraborty
EDCC
1999
Springer
13 years 11 months ago
Dependability Modelling and Sensitivity Analysis of Scheduled Maintenance Systems
Abstract. In this paper we present a new modelling approach for dependability evaluation and sensitivity analysis of Scheduled Maintenance Systems, based on a Deterministic and Sto...
Andrea Bondavalli, Ivan Mura, Kishor S. Trivedi