Sciweavers

832 search results - page 132 / 167
» Effect of Malicious Synchronization
Sort
View
140
Voted
MOMPES
2009
IEEE
15 years 10 months ago
Reliable operating modes for distributed embedded systems
Hard real-time embedded distributed systems pose huge demands in their implementation which must contain as few faults as possible. Over the past years, model-driven development a...
Wolfgang Haberl, Stefan Kugele, Uwe Baumgarten
121
Voted
ADAEUROPE
2009
Springer
15 years 10 months ago
Weak Fairness Semantic Drawbacks in Java Multithreading
With the development of embedded and mobile systems, Java is widely used for application programs and is also considered for implementing systems kernel or application platforms. I...
Claude Kaiser, Jean-François Pradat-Peyre
127
Voted
POLICY
2009
Springer
15 years 10 months ago
Towards Session-Aware RBAC Administration and Enforcement with XACML
Abstract—An administrative role-based access control (ARBAC) model specifies administrative policies over a role-based access control (RBAC) system, where an administrative perm...
Min Xu, Duminda Wijesekera, Xinwen Zhang, Deshan C...
132
Voted
SEKE
2009
Springer
15 years 10 months ago
An Architecture-based Evolution Management Method for Software Product Line
In software product line (SPL) development, evolutions occur in core assets and application products. How to ensure their alignment in evolution is a big challenge. Products in an...
Xin Peng, Liwei Shen, Wenyun Zhao
190
Voted
CRV
2008
IEEE
183views Robotics» more  CRV 2008»
15 years 10 months ago
Robust Real-Time Bi-Layer Video Segmentation Using Infrared Video
In this paper, we propose a novel method for the automatic segmentation of a foreground layer from a natural scene in real time by fusing infrared, color and edge information. Thi...
Qiong Wu, Pierre Boulanger, Walter F. Bischof