Search

Showing total 98 results
98 results

Search Results

1. Selected papers of the ARCS02 conference: an introduction.

2. Call and Calendar.

3. A Computer System for Transformational Grammar.

4. Security Kernel Validation in Practice.

5. A Lattice Model of Secure Information Flow.

6. Editorial: New Directions.

7. Dynamic Storage Allocation Systems.

8. Open Source Textbooks: A Paradigm Derived from Open Source Software.

9. User Study for Understanding Efficiency and Requirements of Computer-aided Support Systems for Home Help Staff Scheduling.

10. Reusing functional software requirements in small-sized software enterprises: a model oriented to the catalog of requirements.

11. A transformation contract to generate aspects from access control policies.

12. A new taxonomy for comparing intrusion detection systems.

13. G-ROME: semantic-driven capacity sharing among P2P networks.

14. Evaluation of Software-Implemented Fault-Tolerance (SIFT) Approach in Gracefully Degradable Multi-Computer Systems.

15. An incentive-based architecture to enable privacy in dynamic environments.

16. BladeCenter midplane and media interface card.

17. BladeCenter systems management software.

18. Automatic Verification of Static Policies on Software Process Models.

19. Process-Based Software Engineering: Building the Infrastructures.

20. A Measurement-Based Framework for Software Reliability Improvement.

21. Managing Software Reuse Economics: An Integrated ROI-based Model.

22. The JEDI Event-Based Infrastructure and Its Application to the Development of the OPSS WFMS.

23. Implementability of requirements in the four-variable model.

24. WIRELESS COYOTE: A COMPUTER-SUPPORTED FIELD TRIP.

25. Estimation of the Hurst Exponent for Market Indices by Use of Rescaled Range Method and CAS Mathematica. Case study: S&P500.

26. Concepts, Design, and Development of a Multiplatform Framework for Real-Time Control in Nuclear Fusion.

27. Toward a Model of Responsibility for Proactive Systems.

28. A Fast and Accurate Technique for Mapping Parallel Applications on Stream-Oriented MPSoC Platforms with Communication Awareness.

29. Analysis and Optimisation of Hierarchically Scheduled Multiprocessor Embedded Systems.

30. Hybrid Runtime Management of Space-Time Heterogeneity for Parallel Structured Adaptive Applications.

31. ACOM: Any-Source Capacity-Constrained Overlay Multicast in Non-DHT P2P Networks.

32. Amdahl’s Law Revisited for Single Chip Systems.

33. Computer-Generated Marbling Textures: A GPU-Based Design System.

34. Reinforce Networking Theory with OPNET Simulation.

35. Versioned boxes as the basis for memory transactions

36. Adaptive resource management for dynamic distributed real-time applications.

37. Creative destruction of computing systems: analysis and modeling.

38. Generalized methods for algorithm development on optical systems.

39. A Synthetic Workload Generation Technique for Stress Testing Session-Based Systems.

40. A conceptual model integrating trust into planned change activities to enhance technology adoption behavior.

41. Improving training needs assessment processes via the Internet: system design and qualitative study.

42. A New Methodology for Predicting Software Reliability in the Random Field Environments.

43. On Optimal Deadlock Detection Scheduling.

44. Early Register Deallocation Mechanisms Using Checkpointed Register Files.

45. Throttling-Based Resource Management in High Performance Multithreaded Architectures.

46. Dual-Homing Based Scalable Partial Multicast Protection.

47. Frame-Based Proportional Round-Robin.

48. An RSA Implementation Resistant to Fault Attacks and to Simple Power Analysis.

49. Designing Resistant Circuits against Malicious Faults Injection Using Asynchronous Logic.

50. Fault Detection Architectures for Field Multiplication Using Polynomial Bases.