Sciweavers

209 search results - page 30 / 42
» Refinement of Information Flow Architectures
Sort
View
DAC
2008
ACM
13 years 9 months ago
SHIELD: a software hardware design methodology for security and reliability of MPSoCs
Security of MPSoCs is an emerging area of concern in embedded systems. Security is jeopardized by code injection attacks, which are the most common types of software attacks. Prev...
Krutartha Patel, Sri Parameswaran
HT
2005
ACM
14 years 1 months ago
The StorySpinner sculptural reader
This demo is of a hypertext reading system called StorySpinner. It follows the sculptural hypertext methodology and has been used as a test bed for experimenting with the authorin...
Clare J. Hooper, Mark J. Weal
EUROMICRO
1998
IEEE
14 years 4 days ago
Process Scheduling for Performance Estimation and Synthesis of Hardware/Software Systems
The paper presents an approach to process scheduling for embedded systems. Target architectures consist of several processors and ASICs connected by shared busses. We have develop...
Petru Eles, Krzysztof Kuchcinski, Zebo Peng, Alexa...
IJACTAICIT
2010
117views more  IJACTAICIT 2010»
13 years 5 months ago
Qualitative Analysis on Matchmaking Techniques for Web Service Discovery
The ample adoption of web services raises the challenging problem in web service discovery. Web service discovery is the process of finding appropriate services for the user defin...
P. Dharanyadevi, P. Dhavachelvan, R. Baskaran, V. ...
SIVP
2008
127views more  SIVP 2008»
13 years 7 months ago
Image indexing and retrieval using expressive fuzzy description logics
Abstract The effective management and exploitation of multimedia documents requires the extraction of the underlying semantics. Multimedia analysis algorithms can produce fairly ri...
Nikos Simou, Thanos Athanasiadis, Giorgos Stoilos,...