Sciweavers

1940 search results - page 319 / 388
» Dependable Software: An Oxymoron
Sort
View
CODES
2002
IEEE
14 years 1 months ago
Communication speed selection for embedded systems with networked voltage-scalable processors
High-speed serial network interfaces are gaining wide use in connecting multiple processors and peripherals in modern embedded systems, thanks to their size advantage and power ef...
Jinfeng Liu, Pai H. Chou, Nader Bagherzadeh
DSN
2002
IEEE
14 years 1 months ago
Performability Analysis of Guarded-Operation Duration: A Successive Model-Translation Approach
When making an engineering design decision, it is often necessary to consider its implications on both system performance and dependability. In this paper, we present a performabi...
Ann T. Tai, William H. Sanders, Leon Alkalai, Savi...
HICSS
2002
IEEE
90views Biometrics» more  HICSS 2002»
14 years 1 months ago
Legitimate by Design: Towards Trusted Virtual Community Environments
Legitimacy is a key part of the social requirements specification for a trusted virtual community environment (VCE). If an environment is not seen as legitimate, social conflicts m...
Brian Whitworth, Aldo de Moor
ISCC
2002
IEEE
111views Communications» more  ISCC 2002»
14 years 1 months ago
How to support Internet-based distribution of video on demand to portable devices
The increasing diffusion of mobile computing and of portable devices with wireless connectivity identifies new challenging scenarios for service provisioning. The access from devi...
Paolo Bellavista, Antonio Corradi
DNA
2001
Springer
14 years 1 months ago
The Fidelity of the Tag-Antitag System
In the universal DNA chip method, target RNAs are mapped onto a set of DNA tags. Parallel hybridization of these tags with an indexed, complementary antitag array then provides an ...
John A. Rose, Russell J. Deaton, Masami Hagiya, Ak...