Sciweavers

72 search results - page 12 / 15
» Designing wrapper components for e-services in integrating h...
Sort
View
HIPEAC
2005
Springer
14 years 1 months ago
Memory-Centric Security Architecture
Abstract. This paper presents a new security architecture for protecting software confidentiality and integrity. Different from the previous process-centric systems designed for ...
Weidong Shi, Chenghuai Lu, Hsien-Hsin S. Lee
ICMI
2010
Springer
196views Biometrics» more  ICMI 2010»
13 years 5 months ago
Component-based high fidelity interactive prototyping of post-WIMP interactions
In order to support interactive high-fidelity prototyping of postWIMP user interactions, we propose a multi-fidelity design method based on a unifying component-based model and su...
Jean-Yves Lionel Lawson, Mathieu Coterot, Cyril Ca...
LCPC
2004
Springer
14 years 1 months ago
Power-Aware Scheduling for Parallel Security Processors with Analytical Models
Techniques to reduce power dissipation for embedded systems have recently come into sharp focus in the technology development. Among these techniques, dynamic voltage scaling (DVS)...
Yung-Chia Lin, Yi-Ping You, Chung-Wen Huang, Jenq ...
ER
2003
Springer
550views Database» more  ER 2003»
14 years 26 days ago
A UML Based Approach for Modeling ETL Processes in Data Warehouses
Data warehouses (DWs) are complex computer systems whose main goal is to facilitate the decision making process of knowledge workers. ETL (Extraction-Transformation-Loading) proces...
Juan Trujillo, Sergio Luján-Mora
GLVLSI
2003
IEEE
140views VLSI» more  GLVLSI 2003»
14 years 28 days ago
Exploiting multiple functionality for nano-scale reconfigurable systems
It is likely that it will become increasingly difficult to manufacture the complex, heterogeneous logic structures that characterise current reconfigurable logic systems. As a res...
Paul Beckett