Sciweavers

1138 search results - page 179 / 228
» Scale-Time Kernels and Models
Sort
View
ICMT
2010
Springer
14 years 1 months ago
Surviving the Heterogeneity Jungle with Composite Mapping Operators
Abstract. Model transformations play a key role in the vision of Modelngineering. Nevertheless, mechanisms like abstraction, variation and composition for specifying and applying r...
Manuel Wimmer, Gerti Kappel, Angelika Kusel, Werne...
SAIG
2001
Springer
14 years 1 months ago
MetaKlaim: Meta-programming for Global Computing
Most foundational models for global computing have focused on the spatial dimension of computations, however global computing requires also new ways of thinking about the temporal ...
Gian Luigi Ferrari, Eugenio Moggi, Rosario Puglies...
SP
2000
IEEE
110views Security Privacy» more  SP 2000»
14 years 1 months ago
LOMAC: Low Water-Mark Integrity Protection for COTS Environments
We hypothesize that a form of kernel-resident accesscontrol-based integrity protection can gain widespread acceptance in Commercial Off-The-Shelf (COTS) environments provided that...
Timothy Fraser
ICPR
2010
IEEE
13 years 7 months ago
Robust ECG Biometrics by Fusing Temporal and Cepstral Information
—The use of vital signs as a biometric is a potentially viable approach in a variety of application scenarios such as security and personalized health care. In this paper, a nove...
Ming Li, Shrikanth Narayanan
SENSYS
2010
ACM
13 years 6 months ago
Efficient diagnostic tracing for wireless sensor networks
Wireless sensor networks (WSNs) are hard to program due to unconventional programming models used to satisfy stringent resource constraints. The common event-driven concurrent pro...
Vinaitheerthan Sundaram, Patrick Th. Eugster, Xian...