Sciweavers

2133 search results - page 419 / 427
» Implementation of a SystemC based Environment
Sort
View
IUI
1998
ACM
13 years 12 months ago
U-TEL: A Tool for Eliciting User Task Models from Domain Experts
Eliciting user-task models is a thorny problem in modelbased user interface design, and communicating domainspecific knowledge from an expert to a knowledge engineer is a continui...
R. Chung-Man Tam, David Maulsby, Angel R. Puerta
SIGMETRICS
1997
ACM
111views Hardware» more  SIGMETRICS 1997»
13 years 11 months ago
Cache Behavior of Network Protocols
In this paper we present a performance study of memory reference behavior in network protocol processing, using an Internet-based protocol stack implemented in the x-kernel runnin...
Erich M. Nahum, David J. Yates, James F. Kurose, D...
DBPL
1989
Springer
165views Database» more  DBPL 1989»
13 years 11 months ago
Support for Data-Intensive Applications: Conceptual Design and Software Development
In the process of developing an Information System, one passes through stages that include requirements gathering, design specification, and software implementation. The purpose ...
Alexander Borgida, John Mylopoulos, Joachim W. Sch...
ACSAC
2009
IEEE
13 years 11 months ago
Justifying Integrity Using a Virtual Machine Verifier
Emerging distributed computing architectures, such as grid and cloud computing, depend on the high integrity execution of each system in the computation. While integrity measuremen...
Joshua Schiffman, Thomas Moyer, Christopher Shal, ...
PERCOM
2010
ACM
13 years 11 months ago
Negotiate power and performance in the reality of RFID systems
—Recent years have witnessed the wide adoption of the RFID technology in many important application domains including logistics, inventory, retailing, public transportation, and ...
Xunteng Xu, Lin Gu, Jianping Wang, Guoliang Xing