Sciweavers

1352 search results - page 129 / 271
» Designing Security Requirements Models Through Planning
Sort
View
ADHOC
2008
135views more  ADHOC 2008»
13 years 10 months ago
Rapid design and evaluation framework for wireless sensor networks
The diversity of applications and typically scarce node resources set very tight constraints to Wireless Sensor Networks (WSN). It is not possible to fulfill all requirements with...
Mauri Kuorilehto, Marko Hännikäinen, Tim...
DAC
2007
ACM
14 years 11 months ago
Designer-Controlled Generation of Parallel and Flexible Heterogeneous MPSoC Specification
Programming multi-processor systems-on-chip (MPSoC) involves partitioning and mapping of sequential reference code onto multiple parallel processing elements. The immense potentia...
Pramod Chandraiah, Rainer Dömer
SIGMETRICS
2008
ACM
131views Hardware» more  SIGMETRICS 2008»
13 years 10 months ago
On the design of hybrid peer-to-peer systems
In this paper, we consider hybrid peer-to-peer systems where users form an unstructured peer-to-peer network with the purpose of assisting a server in the distribution of data. We...
Stratis Ioannidis, Peter Marbach
ISVLSI
2005
IEEE
101views VLSI» more  ISVLSI 2005»
14 years 3 months ago
eWatch: Context Sensitive System Design Case Study
In this paper, we introduce a novel context sensitive system design paradigm. Multiple sensors/ computational architecture, in the form of our eWatch device, is used to infer the ...
Asim Smailagic, Daniel P. Siewiorek, Uwe Maurer, A...
CADUI
2004
13 years 11 months ago
Dialogue-Based Design of Web Usability Questionnaires Using Ontologies
Abstract Questionnaires are nowadays widely used usability evaluation instruments, and several generic usability questionnaires are available. But these generic artifacts are not a...
Elena García Barriocanal, Miguel Áng...