Sciweavers

369 search results - page 56 / 74
» An Automatic Connector Generation Method for Dynamic Archite...
Sort
View
JHSN
2006
95views more  JHSN 2006»
13 years 7 months ago
IPsec/VPN security policy correctness and assurance
: With IPSec/VPN policies being widely deployed, how to correctly specify and configure them is critical in enforcing security requirements. Under current practice, IPSec/VPN polic...
Yanyan Yang, Charles U. Martel, Zhi (Judy) Fu, Shy...
DAC
2006
ACM
14 years 8 months ago
Optimal simultaneous mapping and clustering for FPGA delay optimization
Both technology mapping and circuit clustering have a large impact on FPGA designs in terms of circuit performance, area, and power dissipation. Existing FPGA design flows carry o...
Joey Y. Lin, Deming Chen, Jason Cong
INFOCOM
2006
IEEE
14 years 1 months ago
Achieving Repeatability of Asynchronous Events in Wireless Sensor Networks with EnviroLog
— Sensing events from dynamic environments are normally asynchronous and non-repeatable. This lack of repeatability makes it particularly difficult to statistically evaluate the...
Liqian Luo, Tian He, Gang Zhou, Lin Gu, Tarek F. A...
ECRTS
2005
IEEE
14 years 29 days ago
A WCET-Oriented Static Branch Prediction Scheme for Real Time Systems
Branch prediction mechanisms are becoming commonplace within current generation processors. Dynamic branch predictors, albeit able to predict branches quite accurately in average,...
François Bodin, Isabelle Puaut
CCIA
2009
Springer
13 years 8 months ago
Seeking Acronym Definitions: a Web-based Approach
Acronyms are widely used in many domains to abbreviate and stress important concepts. Due to its dynamicity and unbounded nature, manual attempts to compose a global scale reposito...
David Sánchez, David Isern