Sciweavers

4344 search results - page 695 / 869
» The resourcefulness of everyday design
Sort
View
DAMON
2006
Springer
14 years 28 days ago
Using secure coprocessors for privacy preserving collaborative data mining and analysis
Secure coprocessors have traditionally been used as a keystone of a security subsystem, eliminating the need to protect the rest of the subsystem with physical security measures. ...
Bishwaranjan Bhattacharjee, Naoki Abe, Kenneth Gol...
ESCIENCE
2006
IEEE
14 years 27 days ago
Soft Benchmarks-Based Application Performance Prediction Using a Minimum Training Set
Application execution time prediction is of key importance in making decisions about efficient usage of Grid resources. Grid services lack support of a generic application executi...
Farrukh Nadeem, Muhammad Murtaza Yousaf, Radu Prod...
EUROPAR
2006
Springer
14 years 27 days ago
An Embedded Systems Programming Environment for C
Resource constraints are a major concern with the design, development, and deployment of embedded systems. Embedded systems are highly hardware-dependent and have little computatio...
Bernd Burgstaller, Bernhard Scholz, M. Anton Ertl
FASE
2006
Springer
14 years 27 days ago
Formal Simulation and Analysis of the CASH Scheduling Algorithm in Real-Time Maude
This paper describes the application of the Real-Time Maude tool to the formal specification and analysis of the CASH scheduling algorithm and its suggested modifications. The CASH...
Peter Csaba Ölveczky, Marco Caccamo
FLOPS
2006
Springer
14 years 27 days ago
Soutei, a Logic-Based Trust-Management System
We describe the design and implementation of a trust-management system Soutei, a dialect of Binder, for access control in distributed systems. Soutei policies and credentials are w...
Andrew Pimlott, Oleg Kiselyov