Sciweavers

674 search results - page 78 / 135
» Using Abuse Case Models for Security Requirements Analysis
Sort
View
OOPSLA
2010
Springer
13 years 8 months ago
Language virtualization for heterogeneous parallel computing
As heterogeneous parallel systems become dominant, application developers are being forced to turn to an incompatible mix of low level programming models (e.g. OpenMP, MPI, CUDA, ...
Hassan Chafi, Zach DeVito, Adriaan Moors, Tiark Ro...
APN
2006
Springer
14 years 6 days ago
From Petri Nets to Differential Equations - An Integrative Approach for Biochemical Network Analysis
Abstract. We report on the results of an investigation into the integration of Petri nets and ordinary differential equations (ODEs) for the modelling and analysis of biochemical n...
David Gilbert, Monika Heiner
HICSS
2007
IEEE
100views Biometrics» more  HICSS 2007»
14 years 4 months ago
Performance Analysis of a Middleware Demultiplexing Pattern
A key enabler of the recently adopted, assemblycentric development approach for distributed real-time software systems is QoS-enabled middleware, which provides reusable building ...
U. Praphamontripong, Swapna S. Gokhale, Aniruddha ...
WOSP
2004
ACM
14 years 3 months ago
Early-stage performance modeling and its application for integrated embedded control software design
Most of current embedded control software (ECSW) development techniques deal only with performance specifications during the early software design phase and delay the modeling and...
Shige Wang, Kang G. Shin
IMSA
2001
121views Multimedia» more  IMSA 2001»
13 years 11 months ago
Technology Integrated Learning Environment - A Web-based Distance Learning System
This paper analyses the requirements of a third-generation technology integrated learning environment. The architecture proposed is analysed in terms of the generic constraints of...
Regina Gehne, Chris R. Jesshope, Zhenzi Zhang