Sciweavers

563 search results - page 88 / 113
» A Typing Scheme for Behavioural Models
Sort
View
JPDC
2006
253views more  JPDC 2006»
13 years 7 months ago
Collaborative detection and filtering of shrew DDoS attacks using spectral analysis
This paper presents a new spectral template-matching approach to countering shrew distributed denial-of-service (DDoS) attacks. These attacks are stealthy, periodic, pulsing, and ...
Yu Chen, Kai Hwang
DAC
2005
ACM
14 years 8 months ago
Net weighting to reduce repeater counts during placement
We demonstrate how to use placement to ameliorate the predicted repeater explosion problem caused by poor interconnect scaling. We achieve repeater count reduction by dynamically ...
Brent Goplen, Prashant Saxena, Sachin S. Sapatneka...
GLOBECOM
2008
IEEE
14 years 2 months ago
Cooperative and Non-Cooperative Aloha Games with Channel Capture
—Game theory has been a useful tool for the analysis of random-access based wireless networks due to their decentralized operations. This paper studies one of the most widely use...
Younggeun Cho, Fouad A. Tobagi
COMPSAC
2007
IEEE
14 years 1 months ago
An Automatic Connector Generation Method for Dynamic Architecture
In a component-based system components are basic computation units implementing specific business functions, and their interactions are explicitly represented by connectors. If th...
Yiming Yang, Xin Peng, Wenyun Zhao
DATE
2007
IEEE
108views Hardware» more  DATE 2007»
14 years 1 months ago
Evaluation of design for reliability techniques in embedded flash memories
Non-volatile Flash memories are becoming more and more popular in Systems-on-Chip (SoC). Embedded Flash (eFlash) memories are based on the well-known floatinggate transistor conce...
Benoît Godard, Jean Michel Daga, Lionel Torr...