Sciweavers

410 search results - page 66 / 82
» Validating Cyber Security Requirements: A Case Study
Sort
View
FDL
2006
IEEE
14 years 4 months ago
Layered UML Workload and SystemC Platform Models
Future mobile devices will be based on heterogeneous multiprocessing platforms accommodating several currently stand-alone applications. Increasing complexity of both application ...
Jari Kreku, Yang Qu, Juha-Pekka Soininen, Kari Tie...
ICSM
2005
IEEE
14 years 3 months ago
Appletizing: Running Legacy Java Code Remotely from a Web Browser
Adding distributed capabilities to existing programs has come to the forefront of software evolution. As a standard Java distributed technology, applets offer the advantages of be...
Eli Tilevich, Yannis Smaragdakis, Marcus Handte
WOSP
2005
ACM
14 years 3 months ago
A capacity management service for resource pools
Resource pools are computing environments that offer virtualized access to shared resources. When used effectively they can align the use of capacity with business needs (flexi...
Jerry Rolia, Ludmila Cherkasova, Martin F. Arlitt,...
ISCA
2003
IEEE
168views Hardware» more  ISCA 2003»
14 years 3 months ago
Temperature-Aware Microarchitecture
With power density and hence cooling costs rising exponentially, processor packaging can no longer be designed for the worst case, and there is an urgent need for runtime processo...
Kevin Skadron, Mircea R. Stan, Wei Huang, Sivakuma...
GPCE
2009
Springer
14 years 2 months ago
Safe composition of non-monotonic features
Programs can be composed from features. We want to verify automatically that all legal combinations of features can be composed safely without errors. Prior work on this problem a...
Martin Kuhlemann, Don S. Batory, Christian Kä...