Sciweavers

4330 search results - page 783 / 866
» Analyzing security architectures
Sort
View
150
Voted
MICRO
2010
IEEE
186views Hardware» more  MICRO 2010»
15 years 2 months ago
Phase-Change Technology and the Future of Main Memory
As DRAM and other charge memories reach scaling limits, resistive memories, such as phase change memory (PCM), may permit continued scaling of main memories. However, while PCM ma...
Benjamin C. Lee, Ping Zhou, Jun Yang 0002, Youtao ...
169
Voted
SOSYM
2010
176views more  SOSYM 2010»
15 years 1 months ago
On challenges of model transformation from UML to Alloy
Abstract The Unified Modeling Language (UML) is the de facto language used in the industry for software specifications. Once an application has been specified, Model Driven Arch...
Kyriakos Anastasakis, Behzad Bordbar, Geri Georg, ...
137
Voted
SPRINGSIM
2010
15 years 1 months ago
Advanced IDE for modeling and simulation of discrete event systems
: Creating models and analyzing simulation results can be a difficult and time-consuming task, especially for non-experienced users. Although several DEVS simulators have been deve...
Matías Bonaventura, Gabriel A. Wainer, Rodr...
CASCON
2010
187views Education» more  CASCON 2010»
15 years 1 months ago
A Framework for Automatically Supporting End-Users in Service Composition
In Service Oriented Architecture (SOA), service composition integrates existing services to fulfill specific tasks using a set of standards and tools. However, current service comp...
Hua Xiao, Ying Zou, Ran Tang, Joanna Ng, Leho Nigu...
IMC
2010
ACM
15 years 1 months ago
Network traffic characteristics of data centers in the wild
Although there is tremendous interest in designing improved networks for data centers, very little is known about the network-level traffic characteristics of current data centers...
Theophilus Benson, Aditya Akella, David A. Maltz