2,561 Hits in 8.2 sec

A generic model to handle complexity in collaborative networks

Maike Scherrer-Rathje, Jens Arnoscht, Peter Egri, Eric Braun, Balazs C Csaji, Gunther Schuh
2009 PICMET '09 - 2009 Portland International Conference on Management of Engineering & Technology  
In the past decade, globally the requirement of ERP for academia and industry has experienced exceptional augmentation.  ...  The Proceedings is divided into 44 sections, listed below, each containing several papers on the topic of the section.  ...  This paper will discuss the case of a pilot project based on this model that was conducted through collaboration with Japanese companies and practical co-active innovation model that we obtained from this  ... 
doi:10.1109/picmet.2009.5262237 fatcat:qj6qsep2wzckvefpxq7soiy6q4

Editorial 2015

Stephen P. Jenkins
2015 Journal of Economic Inequality  
I presented an earlier version of this report to the Editorial Board meeting held in July 2015 in conjunction with the ECINEQ conference at the University of Luxembourg.  ...  As the Board meets in person only every second year, my 2016 Editorial will be shorter, focusing on publication statistics and acknowledgements.  ...  (c) Work hard on your Introduction and Conclusions sections and also your Abstract (as well as the rest of your analysis).  ... 
doi:10.1007/s10888-015-9317-z fatcat:4larhtietbc3hh72n42vnxfixi

Guest editorial [Special issue of the digital, memory, and signal processing sessions of the 2003 ISSCC]

S. Segars, A. Sheikholeslami, S. Fischer
2003 IEEE Journal of Solid-State Circuits  
Stewart of the IEEE for coordinating all the details to publish this issue. Also, the Guest Editor of the Memory Section would like to thank K.  ...  SIMON SEGARS, Guest Editor Ali Sheikholeslami (S'98-M'99-SM'02) received the B.Sc. degree from Shiraz University, Shiraz, Iran, in 1990, and the M.A.Sc. and Ph.D. degrees from the University of Toronto  ... 
doi:10.1109/jssc.2003.818123 fatcat:r5xzans5bzh2tlmv3lcszdynam

Tele-Lab IT-Security: an Architecture for an online virtual IT Security Lab

Christoph Meinel, Christian Willems
2008 International Journal of Online Engineering (iJOE)  
Tele-Lab IT-Security was designed to offer hands-on experience exercises in IT security without the need of additional hardware or maintenance expenses.  ...  The only exceptions are the expensive and hard-to-maintain dedicated computer security labs. Those can only be provided by very few organizations.  ...  Virtual machine based computer science courses Instead of dedicated laboratories, at some universities virtual machines have been established for courses with special requirements to hard-or software configuration  ... 
doi:10.3991/ijoe.v4i2.497 doaj:7428980e06d041d5b0d5390a05068e4b fatcat:yum74ijhbbhndmy26panmh5k7e

PIE: A Domain-Specific Language for Interactive Software Development Pipelines

Gabriël Konat, Michael J. Steindorfer, Sebastian Erdweg, Eelco Visser
2018 The Art, Science, and Engineering of Programming  
Compared to the state of the art, PIE reduces the code required to express an interactive pipeline by a factor of 6 in a case study on syntax-aware editors.  ...  Developing an incrementalized and persistent version of a pipeline is one way to reduce feedback latency, but requires dependency tracking, cache invalidation, and other complicated techniques.  ...  Introduction A pipeline is a directed acyclic graph of processors in which data flows from the output of one processor to the input of its succeeding processors.  ... 
doi:10.22152/ fatcat:fjhn4cql3vcblpmanzoz2dyaty

Design and Implementation of a Mobile Sensor Network Testbed Using SUN SPOTs

Hung-Da Shih, Xiaolan Zhang, David S. L. Wei, Kshirasagar Naik, Rung Ching Chen
2013 International Journal of Future Computer and Communication  
Our implementations not only allow multiple sensor nodes to simultaneously connect to the basestation, but also improve the robustness by handling loss of connection (due to node movements or radio interference  ...  The testbed is useful for researches on human mobility pattern, environmental monitoring, and health care, to name a few.  ...  Software developing using Java, a managed runtime language, usually takes less time than using C/C++, a non-managed language, due to the garbage collection, pointer safety, exception handling that comes  ... 
doi:10.7763/ijfcc.2013.v2.133 fatcat:ydcadgcgmrgkhenqfobkndauey

Multiple operating systems on one processor complex

T. L. Borden, J. P. Hennessy, J. W. Rymarczyk
1989 IBM Systems Journal  
With the introduction of Start Interpretive Execution (SIE) Assist in 1985, devices dedicated to the V=R guest benefitted from special treatment by the channel subsystem.  ...  tion of software maintenance.  ... 
doi:10.1147/sj.281.0104 fatcat:v3yuy6lasvbttapxubudoew3iq

Operational planning and control of semiconductor wafer production

J. N. D. Gupta, R. Ruiz, J. W. Fowler, S. J. Mason
2006 Production planning & control (Print)  
It briefly introduces the current operational planning and control problems being solved and the approaches being taken to solve them (optimally or approximately).  ...  Due to increased competition, semiconductor manufacturing has received considerable research attention over the last few decades.  ...  Professor Stephen Childe, Editor-in-Chief of the Production Planning & Control journal originally invited one of the guest editors (Jatinder Gupta) to edit this special issue.  ... 
doi:10.1080/09537280600900733 fatcat:wevunmvvubasfeql66bytsmeaq

Special Issue "Multi-Agent Systems": Editorial

Stefano Mariani, Andrea Omicini
2020 Applied Sciences  
, ranging from logistics to social sciences, from robotics to supply chain, and more.  ...  This special issue gathers 11 contributions sampling the many diverse advancements that are currently ongoing in the MAS field.  ...  devoted to the handling of papers, from submission to publication, through the peer review process.  ... 
doi:10.3390/app10155329 fatcat:366uzqhh3raq5fdoaodw35olim

Teaching Information Systems Technologies: a New Approach based on Virtualization and Hosting Technologies

Alexis Quesada-Arencibia, Carmelo R. García, Santiago Candela, Eduardo Carrasco, Armide González
2012 International Journal of Online Engineering (iJOE)  
The main functionalities and components of an university learning lab based on these technologies are presented. All the software components used in its development are open source.  ...  Also, the use of this lab, providing the computing systems required for the learning activities of different matters related to the information systems technologies, is illustrated.  ...  ACKNOWLEDGMENTS The authors of this paper wish to express their sincere thanks to the Department of Computers Science and Systems and the School of Computer Engineering of the University of Las Palmas  ... 
doi:10.3991/ijoe.v8i4.2151 fatcat:ara6dxlb2vhaxkodmfgcwmgucq

A distributed control architecture of high-speed networks

I. Cidon, I. Gopal, M.A. Kaplan, S. Kutten
1995 IEEE Transactions on Communications  
The high bandwidth dictates the need for specialized hardware to support faster packet handling for both point-to-point and multicast connections.  ...  A faster and more efficient network control is also required in order to support the increased number of connections and their changing requirements with time.  ...  (The one exception is the time that a message from u is on its way to v to transfer the parenthood from u to v.) Each tree has a single node with no Parent.  ... 
doi:10.1109/26.387408 fatcat:k4ry5v37ozgqxkajw3iqn6svmq


T. C. Muench
2011 Proceedings of the Canadian Engineering Education Association (CEEA)  
The design portion of a second term freshman course, 'Introduction to Engineering II', provides an overview of each of the disciplines within the College, and a representative, discipline-specific design  ...  This Electrical Engineering lab requires students to modify a program to implement a microcontroller-based combination lock.  ...  Section 5 investigates the results of student surveys and the information gleaned from feedback/comments.  ... 
doi:10.24908/pceea.v0i0.3916 fatcat:f3uys72uungwpm3qxidrkzaigq

Challenges in real-time virtualization and predictable cloud computing

Marisol García-Valls, Tommaso Cucinotta, Chenyang Lu
2014 Journal of systems architecture  
directions to enable cloud-based real-time applications in the future.  ...  This paper identifies the technical challenges in supporting real-time applications in the cloud, surveys recent advancement in real-time virtualization and cloud computing technology, and offers research  ...  the Spanish National Project REM4VSS (TIN2011-28339); by the US ONR award N000141310800; and by US NSF grant CNS-1329861 (CPS).  ... 
doi:10.1016/j.sysarc.2014.07.004 fatcat:ksxq4ufrc5fuhluo4uw6rbowhi

KeySplitWatermark: Zero Watermarking Algorithm for Software Protection against Cyber-Attacks

Celestine Iwendi, Zunera Jalil, Abdul Rehman Javed, Thippa Reddy G, Rajesh Kaluri, Gautam Srivastava, Ohyun Jo
2020 IEEE Access  
The embedding algorithm uses keywords to make segments of the code to produce a key-dependent on the watermark. The extraction algorithms use this key to remove watermark and detect tampering.  ...  This evolution has added to the problems of software vendors and users where they have to prevent a wide range of attacks.  ...  He is an Editor of International Journal of Engineering and Allied Disciplines, in 2015, a Newsletter Editor of the IEEE Sweden Section, from 2016 to 2018, the Editor-in-Chief of Wireless Sensor Network  ... 
doi:10.1109/access.2020.2988160 fatcat:yantmrrzdrdh5nwhmmbhjsh7qi
« Previous Showing results 1 — 15 out of 2,561 results