Sciweavers

85 search results - page 6 / 17
» TERPS: the embedded reliable processing system
Sort
View
CAISE
2003
Springer
13 years 12 months ago
Evaluation of the SRA Tool Using Data Mining Techniques
This paper describes a validation approach of a socio-technical design support system using data mining techniques. Bayesian Belief Networks (BBN) are used to assess human error an...
Andreas Gregoriades, Alistair G. Sutcliffe, Harala...
ISSS
1996
IEEE
169views Hardware» more  ISSS 1996»
13 years 11 months ago
The Use of a Virtual Instruction Set for the Software Synthesis of HW/SW Embedded Systems
The application range of the embedded computing is going to cover the majority of the market products spanning from consumer electronic, automotive, telecom and process control. F...
Alessandro Balboni, William Fornaciari, M. Vincenz...
DATE
2006
IEEE
71views Hardware» more  DATE 2006»
14 years 23 days ago
Exploring "temperature-aware" design in low-power MPSoCs
The power density inside high performance systems continues to rise with every process technology generation, thereby increasing the operating temperature and creating “hot spot...
Giacomo Paci, Paul Marchal, Francesco Poletti, Luc...
ICIP
2005
IEEE
14 years 8 months ago
Hiding privacy information in video surveillance system
This paper proposes a detailed framework of storing privacy information in surveillance video as a watermark. Authorized personnel is not only removed from the surveillance video ...
Wei Zhang, Sen-Ching S. Cheung, Minghua Chen
BPM
2003
Springer
102views Business» more  BPM 2003»
13 years 12 months ago
A Process-Oriented Model for Authentication on the Basis of a Coloured Petri Net
Abstract. Public-key cryptography is a prerequisite for security in distributed systems and for reliable electronic commerce. The protection of public keys against attacks is the A...
Peter Lory