Tallgrass Publishers, LLC

Displaying 1-6 of 6 results

  • White Papers // Jun 2014

    In-System Programming of Non-Volatile Memories on Microprocessor-centric Boards

    With the continuous growth of capacity of Non-Volatile Memories (NVM) In-System Programming (ISP) has become the most time-consuming step in post-assembly phase of board manufacturing. This paper presents a method to assess ISP solutions for on-chip and on-board NVMs. The major contribution of the approach is the formal basis for...

    Provided By Tallgrass Publishers, LLC

  • White Papers // Dec 2013

    Keyless Signatures' Infrastructure: How to Build Global Distributed Hash-Trees

    Keyless Signatures Infrastructure (KSI) is a globally distributed system for providing time-stamping and server-supported digital signature services. Global per-second hash trees are created and their root hash values published. The authors discuss some service quality issues that arise in practical implementation of the service and present solutions for avoiding single...

    Provided By Tallgrass Publishers, LLC

  • White Papers // Oct 2013

    On In-System Programming of Non-volatile Memories

    With the continuous growth of capacity of Non-Volatile Memories (NVM) In-System Programming (ISP) has become the most time-consuming step in post-assembly phase of board manufacturing. This paper presents a method to assess ISP solutions for on-chip and on-board NVMs. The major contribution of the approach is the formal basis for...

    Provided By Tallgrass Publishers, LLC

  • White Papers // Sep 2012

    On Optimizing Payments Clearance Business Process - An Evolutional Approach

    The payments clearance business process, also known as netting, is an important component of the group business activities especially in the modern world, when concerns includes hundreds of companies integrated by common business activities into a net of chains, but located in different countries and so operating using different currencies,...

    Provided By Tallgrass Publishers, LLC

  • White Papers // Sep 2011

    Multivariate Data Visualization in Social Space

    The authors present a method for analysis of social-economical data that is based on the theory of monotone systems. Their method is based on a computationally simple weight function that describes objects \"Typicality\" for a data table. They apply that method to analyze social-economical data about Estonian island Hiiumaa and...

    Provided By Tallgrass Publishers, LLC

  • White Papers // Aug 2010

    Comparing Quality of Security Models: A Case Study

    System security is an important artefact. However security is typically considered only at an implementation stage nowadays in industry. This makes it difficult to communicate security solutions to the stakeholders earlier and raises the system development cost, especially if security implementation errors are detected. In this paper, the authors compare...

    Provided By Tallgrass Publishers, LLC

  • White Papers // Dec 2013

    Keyless Signatures' Infrastructure: How to Build Global Distributed Hash-Trees

    Keyless Signatures Infrastructure (KSI) is a globally distributed system for providing time-stamping and server-supported digital signature services. Global per-second hash trees are created and their root hash values published. The authors discuss some service quality issues that arise in practical implementation of the service and present solutions for avoiding single...

    Provided By Tallgrass Publishers, LLC

  • White Papers // Sep 2011

    Multivariate Data Visualization in Social Space

    The authors present a method for analysis of social-economical data that is based on the theory of monotone systems. Their method is based on a computationally simple weight function that describes objects \"Typicality\" for a data table. They apply that method to analyze social-economical data about Estonian island Hiiumaa and...

    Provided By Tallgrass Publishers, LLC

  • White Papers // Aug 2010

    Comparing Quality of Security Models: A Case Study

    System security is an important artefact. However security is typically considered only at an implementation stage nowadays in industry. This makes it difficult to communicate security solutions to the stakeholders earlier and raises the system development cost, especially if security implementation errors are detected. In this paper, the authors compare...

    Provided By Tallgrass Publishers, LLC

  • White Papers // Sep 2012

    On Optimizing Payments Clearance Business Process - An Evolutional Approach

    The payments clearance business process, also known as netting, is an important component of the group business activities especially in the modern world, when concerns includes hundreds of companies integrated by common business activities into a net of chains, but located in different countries and so operating using different currencies,...

    Provided By Tallgrass Publishers, LLC

  • White Papers // Jun 2014

    In-System Programming of Non-Volatile Memories on Microprocessor-centric Boards

    With the continuous growth of capacity of Non-Volatile Memories (NVM) In-System Programming (ISP) has become the most time-consuming step in post-assembly phase of board manufacturing. This paper presents a method to assess ISP solutions for on-chip and on-board NVMs. The major contribution of the approach is the formal basis for...

    Provided By Tallgrass Publishers, LLC

  • White Papers // Oct 2013

    On In-System Programming of Non-volatile Memories

    With the continuous growth of capacity of Non-Volatile Memories (NVM) In-System Programming (ISP) has become the most time-consuming step in post-assembly phase of board manufacturing. This paper presents a method to assess ISP solutions for on-chip and on-board NVMs. The major contribution of the approach is the formal basis for...

    Provided By Tallgrass Publishers, LLC