Computer systems

Results: 26232



#Item
241

Worst-Case Execution Time Analysis of Security Policies for Deeply Embedded Real-Time Systems Sibin Mohan Dept. of Computer Science, North Carolina State University, Raleigh, NCAbstract

Add to Reading List

Source URL: www.cs.virginia.edu

- Date: 2008-02-18 18:05:28
    242

    A SINGLE HEISENBERG-GABOR BASED FIGURE-OF-MERIT BASED ON THE MODULATION TRANSFER FUNCTION OF DIGITAL IMAGING SYSTEMS Corey Manders and Steve Mann University of Toronto Dept. of Electrical and Computer Engineering 10 King

    Add to Reading List

    Source URL: www.eyetap.org

    - Date: 2006-09-12 13:52:31
      243

      Will Computer Systems with Performance Guarantees Ever Go Mainstream? Juan A. Colmenares Computer Science Laboratory (CSL) Samsung Research America - Silicon Valley (SRA-SV) <>

      Add to Reading List

      Source URL: juancol.me

      - Date: 2014-01-25 00:54:15
        244

        Privacy Consensus in Anonymization Systems Via Game Theory Rosa Karimi Adl, Mina Askari, Ken Barker, and Reihaneh Safavi-Naini Department of Computer Science, University of Calgary, Canada {rkarimia,maskari,kbarker,rei}@

        Add to Reading List

        Source URL: dspace.ucalgary.ca

        - Date: 2015-03-19 05:09:30
          245

          Foundations and Formalizations of Self-Organization Daniel Polani Adaptive Systems Research Group Department of Computer Science University of Hertfordshire

          Add to Reading List

          Source URL: apophenia.wdfiles.com

          - Date: 2013-02-24 14:08:36
            246

            Toward an Inverse-free Lightweight Encryption Scheme for IoT HakJu Kim* Kwangjo Kim* *Department of Computer Science, KAIST. Abstract The current IoT (Internet of Things) systems cannot provide the overhead caused by ex

            Add to Reading List

            Source URL: caislab.kaist.ac.kr

            - Date: 2014-12-07 00:07:10
              247

              Courses in Computer Information Systems (CISBCIS 1305, COSCIntroduction to Microcomputer ApplicationsThis course develops advanced information technology skills, focusing on office productivity sof

              Add to Reading List

              Source URL: gato-docs.its.txstate.edu

              - Date: 2016-01-09 17:22:43
                248

                Resource-Oriented Partitioned Scheduling in Multiprocessor Systems: How to Partition and How to Share? 1 Wen-Hung Huang1 , Maolin Yang2 , and Jian-Jia Chen1 Department of Computer Science, Technical University of Dortmun

                Add to Reading List

                Source URL: ls12-www.cs.tu-dortmund.de

                - Date: 2016-09-23 02:49:21
                  249

                  Open Information Extraction Systems and Downstream Applications Mausam Computer Science and Engineering Indian Institute of Technology New Delhi, India

                  Add to Reading List

                  Source URL: homes.cs.washington.edu

                  - Date: 2016-07-16 15:30:22
                    250

                    T A C  J D´ Department of Languages and Computer Systems Polytechnical University of Catalunya

                    Add to Reading List

                    Source URL: users.uoa.gr

                    - Date: 2014-06-11 17:30:31
                      UPDATE