Sciweavers

4278 search results - page 693 / 856
» Data prefetch mechanisms
Sort
View
142
Voted
CSFW
2004
IEEE
15 years 8 months ago
Modelling Downgrading in Information Flow Security
Information flow security properties such as noninterference ensure the protection of confidential data by strongly limiting the flow of sensitive information. However, to deal wi...
Annalisa Bossi, Carla Piazza, Sabina Rossi
BPM
2006
Springer
103views Business» more  BPM 2006»
15 years 8 months ago
IT Support for Release Management Processes in the Automotive Industry
Abstract. Car development is based on long running, concurrently executed and highly dependent processes. The coordination and synchronization of these processes has become a compl...
Dominic Müller, Joachim Herbst, Markus Hammor...
DATE
2004
IEEE
113views Hardware» more  DATE 2004»
15 years 8 months ago
Dynamic Memory Management Design Methodology for Reduced Memory Footprint in Multimedia and Wireless Network Applications
New portable consumer embedded devices must execute multimedia and wireless network applications that demand extensive memory footprint. Moreover, they must heavily rely on Dynami...
David Atienza, Stylianos Mamagkakis, Francky Catth...
DATE
2004
IEEE
143views Hardware» more  DATE 2004»
15 years 8 months ago
Fault-Tolerant Deployment of Embedded Software for Cost-Sensitive Real-Time Feedback-Control Applications
Designing cost-sensitive real-time control systems for safetycritical applications requires a careful analysis of the cost/coverage trade-offs of fault-tolerant solutions. This fu...
Claudio Pinello, Luca P. Carloni, Alberto L. Sangi...
DEXAW
2004
IEEE
123views Database» more  DEXAW 2004»
15 years 8 months ago
Self-Adaptive and Self-Optimising Resource Monitoring for Dynamic Grid Environments
As the number of resources on the Grid tends to be very dynamic and potentially large, it becomes increasingly important to discover and monitor them efficiently. This paper conce...
Helene N. Lim Choi Keung, Justin R. D. Dyson, Step...