Sciweavers

2099 search results - page 281 / 420
» A Component Based Software Architecture for E-Government App...
Sort
View
ICCD
2002
IEEE
141views Hardware» more  ICCD 2002»
14 years 6 months ago
Embedded Operating System Energy Analysis and Macro-Modeling
A large and increasing number of modern embedded systems are subject to tight power/energy constraints. It has been demonstrated that the operating system (OS) can have a signifi...
Tat Kee Tan, Anand Raghunathan, Niraj K. Jha
SOCO
2008
Springer
13 years 7 months ago
Context-aware, self-scaling Fuzzy ArtMap for received signal strength based location systems
Location awareness is the key capability of mobilecomputingapplications. Despitehighdemand, indoor location technologies have not become truly ubiquitous mainly due to their requir...
Uzair Ahmad, Andrey Gavrilov, Young-Koo Lee, Sungy...
DAC
2002
ACM
14 years 10 months ago
A universal technique for fast and flexible instruction-set architecture simulation
In the last decade, instruction-set simulators have become an essential development tool for the design of new programmable architectures. Consequently, the simulator performance ...
Achim Nohl, Gunnar Braun, Oliver Schliebusch, Rain...
FCCM
2005
IEEE
131views VLSI» more  FCCM 2005»
14 years 2 months ago
Automating the Layout of Reconfigurable Subsystems Using Circuit Generators
When designing systems-on-a-chip (SoCs), a unique opportunity exists to generate custom FPGA architectures that are specific to the application domain in which the device will be ...
Shawn Phillips, Scott Hauck
SACMAT
2005
ACM
14 years 2 months ago
Peer-to-peer access control architecture using trusted computing technology
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard...
Ravi S. Sandhu, Xinwen Zhang