Sciweavers

832 search results - page 132 / 167
» Effect of Malicious Synchronization
Sort
View
MOMPES
2009
IEEE
14 years 4 months ago
Reliable operating modes for distributed embedded systems
Hard real-time embedded distributed systems pose huge demands in their implementation which must contain as few faults as possible. Over the past years, model-driven development a...
Wolfgang Haberl, Stefan Kugele, Uwe Baumgarten
ADAEUROPE
2009
Springer
14 years 4 months ago
Weak Fairness Semantic Drawbacks in Java Multithreading
With the development of embedded and mobile systems, Java is widely used for application programs and is also considered for implementing systems kernel or application platforms. I...
Claude Kaiser, Jean-François Pradat-Peyre
POLICY
2009
Springer
14 years 4 months ago
Towards Session-Aware RBAC Administration and Enforcement with XACML
Abstract—An administrative role-based access control (ARBAC) model specifies administrative policies over a role-based access control (RBAC) system, where an administrative perm...
Min Xu, Duminda Wijesekera, Xinwen Zhang, Deshan C...
SEKE
2009
Springer
14 years 4 months ago
An Architecture-based Evolution Management Method for Software Product Line
In software product line (SPL) development, evolutions occur in core assets and application products. How to ensure their alignment in evolution is a big challenge. Products in an...
Xin Peng, Liwei Shen, Wenyun Zhao
CRV
2008
IEEE
183views Robotics» more  CRV 2008»
14 years 4 months ago
Robust Real-Time Bi-Layer Video Segmentation Using Infrared Video
In this paper, we propose a novel method for the automatic segmentation of a foreground layer from a natural scene in real time by fusing infrared, color and edge information. Thi...
Qiong Wu, Pierre Boulanger, Walter F. Bischof