Sciweavers

8658 search results - page 1523 / 1732
» Models of Command and Control
Sort
View
127
Voted
ICFEM
2003
Springer
15 years 7 months ago
Formal Proof of a Polychronous Protocol for Loosely Time-Triggered Architectures
The verification of safety critical systems has become an area of increasing importance in computer science. The notion of reactive system has emerged to concentrate on problems r...
Mickaël Kerboeuf, David Nowak, Jean-Pierre Ta...
IFIP
2003
Springer
15 years 7 months ago
Exact Probabilistic Analysis of the Limited Scheduling Algorithm for Symmetrical Bluetooth Piconets
Efficient communication in Bluetooth scatternets requires design of intra and inter-piconet scheduling algorithms, and therefore numerous algorithms have been proposed. However, du...
Gil Zussman, Uri Yechiali, Adrian Segall
119
Voted
DATE
2010
IEEE
153views Hardware» more  DATE 2010»
15 years 7 months ago
Taming the component timing: A CBD methodology for real-time embedded systems
—The growing trend towards using component based design approach in embedded system development requires addressing newer system engineering challenges. These systems are usually...
Manoj G. Dixit, Pallab Dasgupta, S. Ramesh
145
Voted
AFRIGRAPH
2010
ACM
15 years 7 months ago
Adaptive LOD editing of quad meshes
We present a method for editing the LOD of quad meshes, which supports both adaptive refinement and adaptive coarsening. Starting at a base mesh, we generate a quad-dominant mesh...
Daniele Panozzo, Enrico Puppo
DANCE
2002
IEEE
15 years 7 months ago
Developing Dynamic Security Policies
In this paper we define and provide a general construction for a class of policies we call dynamic policies. In most existing systems, policies are implemented and enforced by ch...
Prasad Naldurg, Roy H. Campbell, M. Dennis Mickuna...
« Prev « First page 1523 / 1732 Last » Next »