Sciweavers

649 search results - page 103 / 130
» Modelling and Measuring Collaborative Software Engineering
Sort
View
ICSM
2009
IEEE
14 years 3 months ago
Expert recommendation with usage expertise
Global and distributed software development increases the need to find and connect developers with relevant expertise. Existing recommendation systems typically model expertise b...
David Ma, David Schuler, Thomas Zimmermann, Jonath...
QSIC
2007
IEEE
14 years 3 months ago
Synthesizing Component-Based WSN Applications via Automatic Combination of Code Optimization Techniques
Wireless sensor network (WSN) applications sense events in-situ and compute results in-network. Their software components should run on platforms with stringent constraints on nod...
Zhenyu Zhang, W. K. Chan, T. H. Tse
CODES
2004
IEEE
14 years 15 days ago
Low energy security optimization in embedded cryptographic systems
Future embedded and wireless devices will be increasingly powerful supporting many applications including one of the most crucial, security. Although many wireless and embedded de...
Catherine H. Gebotys
SIGADA
2004
Springer
14 years 2 months ago
Enforcing security and safety models with an information flow analysis tool
Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
Roderick Chapman, Adrian Hilton
EURODAC
1994
IEEE
211views VHDL» more  EURODAC 1994»
14 years 27 days ago
Advanced simulation and modeling techniques for hardware quality verification of digital systems
synchronisation also play a fundamental role in overall system robustness. ElectroMagnetic Compatibility (EMC) and ElectroMagnetic Interference (EMI) issues also have to be conside...
S. Forno, Stephen Rochel