Sciweavers

875 search results - page 100 / 175
» DAWN for component based systems - just a different perspect...
Sort
View
HICSS
1999
IEEE
139views Biometrics» more  HICSS 1999»
14 years 1 months ago
Five Degrees of Separation: A Human Capital Model of Employment-Related Decisionmaking in the Information Technology Workforce
Successful implementation of information technology (IT)-enabled strategy rests on the performance of IT professionals. Consequently, the development and retention of this "I...
Robert A. Josefek Jr., Robert J. Kauffman
EGOV
2008
Springer
13 years 10 months ago
Test Strategies for Evaluation of Semantic eGovernment Applications
In this paper we present a framework for identifying the test focus and test objectives based on the assumption that automatic information processing based on encoded meaning is th...
Ralf Klischewski, Stefan Ukena
ISCAS
2006
IEEE
135views Hardware» more  ISCAS 2006»
14 years 3 months ago
A sensor system on chip for wireless microsystems
Recent years have seen the rapid development of microsensor technology, system on chip design, wireless technology and ubiquitous computing. When assembled into a complex microsys...
L. Wang, Nizamettin Aydin, A. Astaras, M. Ahmadian...
ICDCS
2000
IEEE
14 years 1 months ago
Quartz: A QoS Architecture for Open Systems
This paper describes an architecture that provides support for quality of service (QoS) specification and enforcement in heterogeneous distributed computing systems. The Quartz Qo...
Frank Siqueira, Vinny Cahill
DAC
2009
ACM
13 years 6 months ago
A physical unclonable function defined using power distribution system equivalent resistance variations
For hardware security applications, the availability of secret keys is a critical component for secure activation, IC authentication and for other important applications including...
Ryan Helinski, Dhruva Acharyya, Jim Plusquellic