Sciweavers

8503 search results - page 1621 / 1701
» Secure Software Architectures
Sort
View
RE
2009
Springer
14 years 3 months ago
[vem: xi: ] - A Methodology for Process Based Requirements Engineering
Service-oriented architectures (SOA) aim at the alignment of business and IT by having a clear business process-centric focus. In order to reach that goal, real-world business pro...
Philipp Liegl, Rainer Schuster, Marco Zapletal, Ch...
UIST
2009
ACM
14 years 3 months ago
Bonfire: a nomadic system for hybrid laptop-tabletop interaction
We present Bonfire, a self-contained mobile computing system that uses two laptop-mounted laser micro-projectors to project an interactive display space to either side of a laptop...
Shaun K. Kane, Daniel Avrahami, Jacob O. Wobbrock,...
CODES
2008
IEEE
14 years 3 months ago
Don't forget memories: a case study redesigning a pattern counting ASIC circuit for FPGAs
Modern embedded compute platforms increasingly contain both microprocessors and field-programmable gate arrays (FPGAs). The FPGAs may implement accelerators or other circuits to s...
David Sheldon, Frank Vahid
COMSWARE
2008
IEEE
14 years 3 months ago
A reality check on sip-based streaming applications on the next generation mobile test network
— The telecom and the internet world is converging towards all-IP network architecture and the operators are keen to provide innovative multimedia services coupled with advanced ...
Chitra Balakrishna, Khalid Al-Begain
NOCS
2008
IEEE
14 years 3 months ago
Debugging Distributed-Shared-Memory Communication at Multiple Granularities in Networks on Chip
We present a methodology to debug a SOC by concentrating on its communication. Our extended communication model includes a) multiple signal groups per interface protocol at each I...
Bart Vermeulen, Kees Goossens, Siddharth Umrani
« Prev « First page 1621 / 1701 Last » Next »