Sciweavers

1407 search results - page 179 / 282
» Cognition without content
Sort
View
121
Voted
ISSTA
2009
ACM
15 years 10 months ago
Analyzing singularity channel contracts
This paper presents techniques for analyzing channel contract specifications in Microsoft Research’s Singularity operating system. A channel contract is a state machine that sp...
Zachary Stengel, Tevfik Bultan
146
Voted
JCDL
2009
ACM
115views Education» more  JCDL 2009»
15 years 10 months ago
Using timed-release cryptography to mitigate the preservation risk of embargo periods
Due to temporary access restrictions, embargoed data cannot be refreshed to unlimited parties during the embargo time interval. A solution to mitigate the risk of data loss has be...
Rabia Haq, Michael L. Nelson
131
Voted
CODES
2008
IEEE
15 years 10 months ago
Distributed and low-power synchronization architecture for embedded multiprocessors
In this paper we present a framework for a distributed and very low-cost implementation of synchronization controllers and protocols for embedded multiprocessors. The proposed arc...
Chenjie Yu, Peter Petrov
142
Voted
EDOC
2008
IEEE
15 years 10 months ago
Using Enterprise Architecture Models for System Quality Analysis
Enterprise Architecture is a model-based approach to business-oriented IT management. To promote good IT decision making, an Enterprise Architecture framework needs to explicate w...
Per Närman, Marten Schönherr, Pontus Joh...
140
Voted
HICSS
2008
IEEE
175views Biometrics» more  HICSS 2008»
15 years 10 months ago
Service-Oriented Resource Management
Service Management controls how business services are developed and delivered to customers. Business services must be flexible negotiable between customer and provider. Temporal a...
Jürgen Dorn, Hannes Werthner