Sciweavers

10239 search results - page 1935 / 2048
» Postmodern Software Development
Sort
View
LCTRTS
2010
Springer
14 years 1 months ago
Cache vulnerability equations for protecting data in embedded processor caches from soft errors
Continuous technology scaling has brought us to a point, where transistors have become extremely susceptible to cosmic radiation strikes, or soft errors. Inside the processor, cac...
Aviral Shrivastava, Jongeun Lee, Reiley Jeyapaul
TES
2001
Springer
14 years 1 months ago
Security for Distributed E-Service Composition
Current developments show that tomorrow’s information systems and applications will no longer be based on monolithic architectures that encompass all the functionality. Rather, t...
Stefan Seltzsam, Stephan Börzsönyi, Alfo...
RSP
2000
IEEE
156views Control Systems» more  RSP 2000»
14 years 1 months ago
Quasi-Static Scheduling of Reconfigurable Dataflow Graphs for DSP Systems
Dataflow programming has proven to be popular for representing applications in rapid prototyping tools for digital signal processing (DSP); however, existing dataflow design tools...
Bishnupriya Bhattacharya, Shuvra S. Bhattacharyya
SIGUCCS
2000
ACM
14 years 1 months ago
Training... A Key to Better Help Desk Consultants
The quality of student consultants and their development through training and education are major factors in determining long-term effectiveness of university Help Desk. To hire a...
Anna Maria Perez, Andrea J. Moore
ECAI
2000
Springer
14 years 1 months ago
Gaining Insights into Web Customers using Web Intelligence
The web is fast maturing into an important marketing medium that provides businesses with the ability to undertake oneto-one marketing and provide personalised services to their cu...
Sarabjot S. Anand, Matthias Baumgarten, Alex G. B&...
« Prev « First page 1935 / 2048 Last » Next »