Sciweavers

438 search results - page 64 / 88
» constraints 1998
Sort
View
CSMR
1998
IEEE
13 years 11 months ago
Protection Reconfiguration for Reusable Software
Secure distributed applications often include code to authenticate users, verify access rights, and establish secure communication channels between software components (e.g., clie...
Christian Damsgaard Jensen, Daniel Hagimont
EUROMICRO
1998
IEEE
13 years 11 months ago
Approaches for Scheduling of Triggered Transactions in Real-Time Active Database Systems
A real-time active database system (RTADBS) has to provide capabilities for timely trigger of timeconstrained transactions and at the same time to process them, concurrently with ...
Kam-yiu Lam, Tony S. H. Lee
HICSS
1998
IEEE
90views Biometrics» more  HICSS 1998»
13 years 11 months ago
Real-Time New Product Development in Financial Services: Some Managerial Implications
A review of the various models of New Product Development (NPD) process shows that although different approaches have been proposed, they are in fact all variants on a linear them...
Pete Naudé, Ian D. Blackman, S. Dengler
HICSS
1998
IEEE
158views Biometrics» more  HICSS 1998»
13 years 11 months ago
Accountability Centered Approach to Business Process Reengineering
In this paper, Accountability Centered Approach (ACA) is proposed for business process engineering. The ACA approach enables the designers and users to focus on the requirements a...
Mitchell M. Tseng, Chuan-Jun Su, Ma Qinhai
ICCAD
1998
IEEE
105views Hardware» more  ICCAD 1998»
13 years 11 months ago
Fanout optimization under a submicron transistor-level delay model
In this paper we present a new fanout optimization algorithm which is particularly suitable for digital circuits designed with submicron CMOS technologies. Restricting the class o...
Pasquale Cocchini, Massoud Pedram, Gianluca Piccin...