Sciweavers

2216 search results - page 200 / 444
» Integration of Usability Techniques into the Software Develo...
Sort
View
DATE
2005
IEEE
154views Hardware» more  DATE 2005»
15 years 9 months ago
Secure Embedded Processing through Hardware-Assisted Run-Time Monitoring
— Security is emerging as an important concern in embedded system design. The security of embedded systems is often compromised due to vulnerabilities in “trusted” software t...
Divya Arora, Srivaths Ravi, Anand Raghunathan, Nir...
IJHPCA
2006
77views more  IJHPCA 2006»
15 years 4 months ago
An Interoperability Approach to System Software, Tools, and Libraries for Clusters
Systems software for clusters typically derives from a multiplicity of sources: the kernel itself, software associated with a particular distribution, site-specific purchased or o...
Ewing L. Lusk, Narayan Desai, Rick Bradshaw, Andre...
AC
2003
Springer
15 years 7 months ago
Business Process Management Demystified: A Tutorial on Models, Systems and Standards for Workflow Management
Abstract. Over the last decade there has been a shift from "data-aware" information systems to "process-aware" information systems. To support business processe...
Wil M. P. van der Aalst
BMVC
1998
15 years 5 months ago
A Bi-Directional Integrated Model for Non-Rigid Motion Analysis
To be able to understand the motion of deformable objects, techniques in image processing and computer vision are essential for non-rigid motion analysis in this active research a...
Chunyen Liu
IMECS
2007
15 years 5 months ago
On Extendable Software Architecture for Spam Email Filtering
—The research community and the IT industry have invested significant effort in fighting spam emails. There are many different approaches, ranging from white listing, black listi...
Wanli Ma, Dat Tran, Dharmendra Sharma