Search

Your search keyword '"Architectures Matérielles"' showing total 170 results

Search Constraints

Start Over You searched for: Descriptor "Architectures Matérielles" Remove constraint Descriptor: "Architectures Matérielles" Language undetermined Remove constraint Language: undetermined
170 results on '"Architectures Matérielles"'

Search Results

1. Cacol: A zero overhead and non-intrusive double caching mitigation system

2. Elderly monitoring system in a smart city environment using LoRa and MQTT

3. Performances Analysis of a System of Localization by Angle of Arrival UWB Radio

4. Preventing the propagation of a new kind of illegitimate apps

5. Design and evaluation of braced touch for touchscreen input stabilisation

6. On a unifying product form framework for redundancy models

7. Fast maximum coverage of system behavior from a performance and power point of view

8. DV-Hop Localization With Protocol Sequence Based Access

9. Modeling, classifying and generating large-scale Google-like workload

10. Network Lifetime Management in Wireless Sensor Networks

11. Engineering secure systems: Models, patterns and empirical validation

12. Energy monitoring as an essential building block towards sustainable ultrascale systems

13. Interactions and Influence of World Painters From the Reduced Google Matrix of Wikipedia Networks

14. Comparative Analysis of Ranging Protocols for Localization by UWB in Outdoor

15. A dedicated approach for model composition traceability

16. Multi-cultural Wikipedia mining of geopolitics interactions leveraging reduced Google matrix analysis

17. Spatio-temporal thermal-aware scheduling for homogeneous high-performance computing datacenters

18. Supporting pattern-based dependability engineering via model-driven development: Approach, tool-support and empirical validation

19. Everything You Should Know About Intel SGX Performance on Virtualized Systems

20. Divide to Conquer: Functional Decomposition to Support Model-Based Engineering of Command and Control of Cyber-Physical Systems

21. e-Flooding: Crisis Management through Two Temporal Loops

22. Initial Placement Optimization for Multi-channel UAV Networks

23. Tasks in Modular Proofs of Concurrent Algorithms

24. On the diversity of asynchronous communication

25. Modulo Based Data Placement Algorithm for Energy Consumption Optimization of MapReduce System

26. IDF: A framework for the incremental development and conformance verification of UML active primitive components

27. Markov-modulated M/G/1-type queue in heavy traffic and its application to time-sharing disciplines

28. Enforcing CPU allocation in a heterogeneous IaaS

29. A DSL for requirements in the context of a seamless approach

30. Adaptive Load Control for IoT Based on Satellite Communications

31. Collaborative Processes Management: from Modeling to Enacting

32. Welcome to zombieland

33. Automation

34. Correctness by construction and style preserving reconfigurations of system of systems

35. Geopolitical interactions from reduced Google matrix analysis of Wikipedia

36. Specificities of the LoRa™ Physical Layer for the Development of New Ad Hoc MAC Layers

37. Adaptive hybrid MAC protocols for UAV-assisted mobile sensor networks

38. The new SIGCHI EC's values and strategic initiatives

39. Modeling and verification of Functional and Non-Functional Requirements of ambient Self-Adaptive Systems

40. Towards a verified transformation from AADL to the formal component-based language FIACRE

41. Contract-based modeling and verification of timed safety requirements within SysML

42. Exploring AADL verification tool through model transformation

43. Simulation of real-time systems with clock calculus

44. A thorough analysis of the performance of delay distribution models for IEEE 802.11 DCF

45. MDE in Practice for Computational Science

46. A comparative analysis with validation of NSGA-III and MOEA/D in resolving the 3D indoor redeployment problem in DL-IoT

47. Mobile interaction with and in autonomous vehicles

48. Seamless Integration of Multirequirements in Complex Systems

49. Which Security Requirements Engineering Methodology Should I Choose?

50. Two safety patterns

Catalog

Books, media, physical & digital resources