Sciweavers

8503 search results - page 1631 / 1701
» Secure Software Architectures
Sort
View
CASES
2006
ACM
14 years 16 days ago
Probabilistic arithmetic and energy efficient embedded signal processing
Probabilistic arithmetic, where the ith output bit of addition and multiplication is correct with a probability pi, is shown to be a vehicle for realizing extremely energy-efficie...
Jason George, B. Marr, Bilge E. S. Akgul, Krishna ...
CBSE
2006
Springer
14 years 16 days ago
Generic Component Lookup
The possibilities currently offered to conduct business at an electronic level are immense. Service providers offer access to their attendances through components placed on the Int...
Till G. Bay, Patrick Th. Eugster, Manuel Oriol
CLEF
2006
Springer
14 years 16 days ago
TALP at GeoCLEF 2006: Experiments Using JIRS and Lucene with the ADL Feature Type Thesaurus
This paper describes our experiments in Geographical Information Retrieval (GIR) in the context of our participation in the GeoCLEF 2006 Monolingual English task. The TALPGeoIR sy...
Daniel Ferrés, Horacio Rodríguez
EDO
2006
Springer
14 years 14 days ago
Improving modularity of reflective middleware with aspect-oriented programming
Reflective middleware has been proposed as an effective way to enhance adaptability of component-oriented middleware architectures. To be effectively adaptable, the implementation...
Nélio Cacho, Thaís Vasconcelos Batis...
CASES
2001
ACM
14 years 13 days ago
Storage allocation for embedded processors
In an embedded system, it is common to have several memory areas with different properties, such as access time and size. An access to a specific memory area is usually restricted...
Jan Sjödin, Carl von Platen
« Prev « First page 1631 / 1701 Last » Next »