Sciweavers

1080 search results - page 156 / 216
» Modeling Constraint Programs with Software Technology Standa...
Sort
View
ISCI
2007
152views more  ISCI 2007»
13 years 7 months ago
Evaluating digital video recorder systems using analytic hierarchy and analytic network processes
Digital video recorder (DVR) systems are novel security products with significant potential for application in the surveillance market, which, like many other areas of security t...
Che-Wei Chang, Cheng-Ru Wu, Chin-Tsai Lin, Hung-Lu...
DEXAW
2007
IEEE
103views Database» more  DEXAW 2007»
14 years 2 months ago
Patterns for Authentication and Authorisation Infrastructures
In line with the growing success of e-commerce demands for an open infrastructure providing security services are growing stronger. Authentication and Authorisation Infrastructure...
Roland Erber, Christian Schläger, Günthe...
LCTRTS
2009
Springer
14 years 2 months ago
Eliminating the call stack to save RAM
Most programming languages support a call stack in the programming model and also in the runtime system. We show that for applications targeting low-power embedded microcontroller...
Xuejun Yang, Nathan Cooprider, John Regehr
COLLABORATION
1999
Springer
14 years 1 days ago
Shifting the Focus from Control to Communication: the STReams OBjects Environments Model of Communicating Agents
The paper presents the computational model underlying new agent communication languages. The model, called STROBE, has been identified and two prototypical languages inspired by th...
Stefano A. Cerri
BIOSYSTEMS
2007
103views more  BIOSYSTEMS 2007»
13 years 7 months ago
A design framework to model retinas
Neuro-engineering is providing biomedical engineers with technology to interface the nervous system, which is useful to create prosthetic devices to palliate sensorial or motor di...
Christian A. Morillas, Samuel F. Romero, Antonio M...