Sciweavers

1393 search results - page 128 / 279
» Performance evaluation of component-based software systems: ...
Sort
View
IJPRAI
2010
105views more  IJPRAI 2010»
13 years 6 months ago
An Ontology-Based Model for Representing Image Processing Application Objectives
This paper investigates what kinds of information are necessary and sufficient to design and evaluate image processing software programs and proposes a representation of these inf...
Régis Clouard, Arnaud Renouf, Marinette Rev...
DAC
2007
ACM
14 years 10 months ago
A System For Coarse Grained Memory Protection In Tiny Embedded Processors
Many embedded systems contain resource constrained microcontrollers where applications, operating system components and device drivers reside within a single address space with no...
Ram Kumar, Akhilesh Singhania, Andrew Castner, Edd...
HICSS
2007
IEEE
137views Biometrics» more  HICSS 2007»
14 years 3 months ago
Value Driven Security Threat Modeling Based on Attack Path Analysis
This paper presents a quantitative threat modeling method, the Threat Modeling method based on Attack Path Analysis (T-MAP), which quantifies security threats by calculating the t...
Yue Chen, Barry W. Boehm, Luke Sheppard
IPM
2007
143views more  IPM 2007»
13 years 9 months ago
QCS: A system for querying, clustering and summarizing documents
Information retrieval systems consist of many complicated components. Research and development of such systems is often hampered by the difficulty in evaluating how each particula...
Daniel M. Dunlavy, Dianne P. O'Leary, John M. Conr...
CASES
2009
ACM
14 years 3 months ago
Parallel, hardware-supported interrupt handling in an event-triggered real-time operating system
A common problem in event-triggered real-time systems is caused by low-priority tasks that are implemented as interrupt handlers interrupting and disturbing high-priority tasks th...
Fabian Scheler, Wanja Hofer, Benjamin Oechslein, R...