Sciweavers

1934 search results - page 309 / 387
» Application specific NoC design
Sort
View
128
Voted
COOPIS
2004
IEEE
15 years 8 months ago
Security Management Through Overloading Views
The model of overloading views is a facility allowing the programmer to separate some kinds of crosscutting concerns that occur during design, implementation and maintenance of dat...
Radoslaw Adamus, Kazimierz Subieta
BIOADIT
2006
Springer
15 years 8 months ago
MOVE Processors That Self-replicate and Differentiate
Abstract. This article describes an implementation of a basic multiprocessor system that exhibits replication and differentiation abilities on the POEtic tissue, a programmable har...
Joël Rossier, Yann Thoma, Pierre-André...
DRM
2006
Springer
15 years 8 months ago
Towards a secure and interoperable DRM architecture
In this paper we look at the problem of interoperability of digital rights management (DRM) systems in home networks. We introduce an intermediate module called the Domain Interop...
Gelareh Taban, Alvaro A. Cárdenas, Virgil D...
156
Voted
E4MAS
2006
Springer
15 years 8 months ago
Enhancing the Environment with a Law-Governed Service for Monitoring and Enforcing Behavior in Open Multi-Agent Systems
Environment is an essential part of any multi-agent system (MAS), since it provides the surrounding conditions for agents to exist. For some sort of systems, the environment can be...
Rodrigo B. de Paes, Gustavo R. de Carvalho, Ma&iac...
134
Voted
EURONGI
2006
Springer
15 years 8 months ago
The Challenges of Merging Two Similar Structured Overlays: A Tale of Two Networks
Structured overlay networks is an important and interesting primitive that can be used by diverse peer-to-peer applications. Multiple overlays can result either because of network ...
Anwitaman Datta, Karl Aberer