Sciweavers

897 search results - page 173 / 180
» Reuse, Validation and Verification of System Development Pro...
Sort
View
DASFAA
2009
IEEE
193views Database» more  DASFAA 2009»
13 years 11 months ago
Encryption over Semi-trusted Database
—Database security has become a vital issue in modern Web applications. Critical business data in databases is an evident target for attack. Therefore, ensuring the confidentiali...
Hasan Kadhem, Toshiyuki Amagasa, Hiroyuki Kitagawa
ICSE
2005
IEEE-ACM
14 years 7 months ago
Predictors of customer perceived software quality
Predicting software quality as perceived by a customer may allow an organization to adjust deployment to meet the quality expectations of its customers, to allocate the appropriat...
Audris Mockus, Ping Zhang, Paul Luo Li
ISLPED
2004
ACM
123views Hardware» more  ISLPED 2004»
14 years 1 months ago
An efficient voltage scaling algorithm for complex SoCs with few number of voltage modes
Increasing demand for larger high-performance applications requires developing more complex systems with hundreds of processing cores on a single chip. To allow dynamic voltage sc...
Bita Gorjiara, Nader Bagherzadeh, Pai H. Chou
WINET
2008
200views more  WINET 2008»
13 years 7 months ago
Performance evaluation of an IEEE 802.15.4 sensor network with a star topology
One class of applications envisaged for the IEEE 802.15.4 LR-WPAN (low data rate - wireless personal area network) standard is wireless sensor networks for monitoring and control a...
Chandramani Kishore Singh, Anurag Kumar, P. M. Ame...
HPDC
2009
IEEE
14 years 2 months ago
TakTuk, adaptive deployment of remote executions
This article deals with TakTuk, a middleware that deploys efficiently parallel remote executions on large scale grids (thousands of nodes). This tool is mostly intended for intera...
Benoit Claudel, Guillaume Huard, Olivier Richard