Efficient scheduling is a key concern for the effectual execution of performance driven Grid applications, such as workflows. Many list heuristics have been developed for scheduling workflows in centralized Grid envir...
详细信息
Next generation networks, as well as the Future Internet, aim to provide context-sensitive business services that adapt to changing user needs, business goals, and environmental conditions. This paper describes the co...
详细信息
The application of microarray data for cancer classification has recently gained in popularity. The main problem that needs to be addressed is the selection of a smaller subset of genes from the thousands of genes in ...
详细信息
With the growth of Utility Grids and various Grid market infrastructures, the need for efficient and cost effective scheduling algorithms is also increasing rapidly, particularly in the area of meta-scheduling. In the...
详细信息
Microarray data are expected to be useful for cancer classification. The main problem that needs to be addressed is the selection of a smaller subset of genes from the thousands of genes in the data that contributes t...
详细信息
A pragmatic and straightforward approach to semantic service discovery is to match inputs and outputs of user requests with the input and output requirements of registered service descriptions. This approach can be ex...
详细信息
The SecureMDD approach aims to generate both, a formal specification for verification and executable code, from UML diagrams. The UML models define the static as well as dynamic components of the system under developm...
详细信息
ISBN:
(纸本)9781424437252
The SecureMDD approach aims to generate both, a formal specification for verification and executable code, from UML diagrams. The UML models define the static as well as dynamic components of the system under development. This model-driven approach is focused on security-critical applications that are based on cryptographic protocols, especially Java Card applications. In this paper we describe the generation of the formal specification from the UML model which is then used as input for our interactive verification system KIV. The formal specification is based on abstract state machines and algebraic specifications. It allows to formulate and to prove application-specific security properties.
Single Carrier Transmission (SCT) is a competing technique for Orthogonal Frequency Division Multiplexing (OFDM) in Broadband Wireless systems (BWS). Recent developments in Frequency Domain Equalization (FDE) using De...
详细信息
Moving and resizing desktop windows are frequently performed but largely unexplored interaction tasks. The standard title bar and border dragging techniques used for window manipulation have not changed much over the ...
详细信息
The delay of a circuit implemented in a Lookup table (LUT) based Field-Programmable Gate Arrays (FPGAs) is a combination of routing delays, and logic block delays. However most of an FPGA's area is devoted to prog...
详细信息
暂无评论