Sciweavers

1079 search results - page 109 / 216
» An Implementation of an Address Generator Using Hash Memorie...
Sort
View
CBSE
2004
Springer
14 years 2 months ago
A Framework for Reliability Assessment of Software Components
Abstract. This paper proposes a conceptual framework for the reliability assessment of software components that incorporates test case execution and output evaluation. Determining ...
Rakesh Shukla, Paul A. Strooper, David A. Carringt...
ICNP
2007
IEEE
14 years 3 months ago
HEXA: Compact Data Structures for Faster Packet Processing
—Data structures representing directed graphs with edges labeled by symbols from a finite alphabet are used to implement packet processing algorithms used in a variety of network...
Sailesh Kumar, Jonathan S. Turner, Patrick Crowley...
ADHOCNETS
2009
Springer
14 years 3 months ago
Building Intrusion Detection with a Wireless Sensor Network
Abstract. This paper addresses the detection and reporting of abnormal building access with a wireless sensor network. A common office room, offering space for two working persons...
Markus Wälchli, Torsten Braun
EMSOFT
2007
Springer
14 years 3 months ago
Buffer optimization and dispatching scheme for embedded systems with behavioral transparency
Software components are modular and can enable post-deployment update, but their high overhead in runtime and memory is prohibitive for many embedded systems. This paper proposes ...
Jiwon Hahn, Pai H. Chou
SPAA
1998
ACM
14 years 1 months ago
Lamport Clocks: Verifying a Directory Cache-Coherence Protocol
Modern shared-memory multiprocessors use complex memory system implementations that include a variety of non-trivial and interacting optimizations. More time is spent in verifying...
Manoj Plakal, Daniel J. Sorin, Anne Condon, Mark D...