Sciweavers

1218 search results - page 196 / 244
» Model-Driven Development of Mobile Applications
Sort
View
SRDS
1999
IEEE
14 years 1 months ago
An Adaptive Checkpointing Protocol to Bound Recovery Time with Message Logging
Numerous mathematical approaches have been proposed to determine the optimal checkpoint interval for minimizing total execution time of an application in the presence of failures....
Kuo-Feng Ssu, Bin Yao, W. Kent Fuchs
SOCA
2010
IEEE
13 years 7 months ago
Virtualised e-Learning with real-time guarantees on the IRMOS platform
In this paper we focus on how Quality of Service guarantees are provided to virtualised applications in the Cloud Computing infrastructure that is being developed in the context of...
Tommaso Cucinotta, Fabio Checconi, Zlatko Zlatev, ...
CVPR
2000
IEEE
14 years 11 months ago
Zebra-Crossing Detection for the Partially Sighted
Zebra-crossings are useful road features for outdoor navigation in mobility aids for the partially sighted. In this paper, zebra-crossings are detected by looking for groups of co...
Stephen Se
CAV
2009
Springer
150views Hardware» more  CAV 2009»
14 years 9 months ago
Automated Analysis of Java Methods for Confidentiality
We address the problem of analyzing programs such as J2ME midlets for mobile devices, where a central correctness requirement concerns confidentiality of data that the user wants t...
Pavol Cerný, Rajeev Alur
DATE
2008
IEEE
116views Hardware» more  DATE 2008»
14 years 3 months ago
A Virtual Prototype for Bluetooth over Ultra Wide Band System Level Design
The industry is merging two different Wireless Personal Area Networks (WPAN) technologies: Bluetooth (BT) and WiMedia Ultra Wide Band (UWB), into a single BT over UWB (BToUWB) spe...
Alexandre Lewicki, Javier del Prado Pavon, Jacky T...