Sciweavers

4330 search results - page 768 / 866
» Analyzing security architectures
Sort
View
154
Voted
ISMIS
2000
Springer
15 years 7 months ago
Design of Rough Neurons: Rough Set Foundation and Petri Net Model
This paper introduces the design of rough neurons based on rough sets. Rough neurons instantiate approximate reasoning in assessing knowledge gleaned from input data. Each neuron c...
James F. Peters, Andrzej Skowron, Zbigniew Suraj, ...
111
Voted
ISSS
1995
IEEE
100views Hardware» more  ISSS 1995»
15 years 7 months ago
Power analysis and low-power scheduling techniques for embedded DSP software
This paper describes the application of a measurement based power analysis technique for an embedded DSP processor. An instruction-level power model for the processor has been dev...
Mike Tien-Chien Lee, Vivek Tiwari, Sharad Malik, M...
142
Voted
NOSSDAV
1995
Springer
15 years 7 months ago
Storage Replication and Layout in Video-on-Demand Servers
We propose and analyze an architecture for storage servers in large Video on Demand (VoD) systems. We describe a method for distributing the collection of titles among the levels o...
Scott D. Stoller, John DeTreville
114
Voted
WSC
2007
15 years 6 months ago
Communication and process simulation of set-based design for concrete reinforcement
Two discrete-event simulations are developed to assess the feasibility of improving the delivery process of reinforced concrete structures. The simulations represent the resource ...
John-Michael Wong, Kristen Parrish, Iris D. Tommel...
111
Voted
WSC
2007
15 years 6 months ago
The SISO CSPI PDG standard for commercial off-the-shelf simulation package interoperability reference models
For many years discrete-event simulation has been used to analyze production and logistics problems in manufacturing and defense. Commercial-off-the-shelf Simulation Packages (CSP...
Simon J. E. Taylor, Navonil Mustafee, Steffen Stra...