Sciweavers

218 search results - page 20 / 44
» Analyzing Packaging Trade-Offs During System Design
Sort
View
DAC
2007
ACM
14 years 12 months ago
Trusted Hardware: Can It Be Trustworthy?
Processing and storage of confidential or critical information is an every day occurrence in computing systems. The trustworthiness of computing devices has become an important co...
Cynthia E. Irvine, Karl N. Levitt
WSC
1998
14 years 7 days ago
Effective Simulation Model Reuse: a case study for AMHS modeling
The application of simulation as a performance estimation tool in automated material handling system design is well documented, as is the amount of time required to build, debug, ...
Gerald T. Mackulak, Frederick P. Lawrence, Theron ...
LCTRTS
1998
Springer
14 years 3 months ago
A Tool to Assist in Fine-Tuning and Debugging Embedded Real-Time Systems
: During the latter stages of a software product cycle, developers may be faced with the task of fine-tuning an embedded system that is not meeting all of its timing requirements. ...
Gaurav Arora, David B. Stewart
MSS
2005
IEEE
131views Hardware» more  MSS 2005»
14 years 4 months ago
Impact of Failure on Interconnection Networks for Large Storage Systems
Recent advances in large-capacity, low-cost storage devices have led to active research in design of large-scale storage systems built from commodity devices for supercomputing ap...
Qin Xin, Ethan L. Miller, Thomas J. E. Schwarz, Da...
ICIAR
2010
Springer
14 years 3 months ago
Two-Factor Authentication or How to Potentially Counterfeit Experimental Results in Biometric Systems
Two-factor authentication has been introduced in order to enhance security in authentication systems. Different factors have been introduced, which are combined for means of contr...
Christian Rathgeb, Andreas Uhl