Sciweavers

1278 search results - page 88 / 256
» Architectures for Controller Based CDP
Sort
View
123
Voted
TSMC
2008
158views more  TSMC 2008»
15 years 2 months ago
Decentralized Inventory Control for Large-Scale Reverse Supply Chains: A Computationally Tractable Approach
In this paper, we consider a new inventory control technique for large-scale supply chains including repairs. The part flow is bidirectional with broken parts propagated upstream f...
Prashanth Krishnamurthy, Farshad Khorrami, David A...
WETICE
1998
IEEE
15 years 7 months ago
Using SESAME's GSS-API to add Security to Unix Applications
SESAME is a security architecture that starts from the Kerberos protocol and adds to it public-key based authentication, role based access control, delegation of rights and an ext...
Paul Ashley, Mark Vandenwauver, Mark Rutherford, S...
105
Voted
DATE
1999
IEEE
85views Hardware» more  DATE 1999»
15 years 7 months ago
At-Speed Boundary-Scan Interconnect Testing in a Board with Multiple System Clocks
As an at-speed solution to board-level interconnect testing, an enhanced boundary-scan architecture utilizing a combination of slightly modified boundary-scan cells and a user-def...
Jongchul Shin, Hyunjin Kim, Sungho Kang
115
Voted
NOCS
2009
IEEE
15 years 9 months ago
CTC: An end-to-end flow control protocol for multi-core systems-on-chip
We propose Connection then Credits (CTC) as a new end-to-end flow control protocol to handle messagedependent deadlocks in networks-on-chip (NoC) for multicore systems-on-chip. C...
Nicola Concer, Luciano Bononi, Michael Soulie, Ric...
132
Voted
AR
2008
188views more  AR 2008»
15 years 2 months ago
Intentional Control for Planetary Rover SRR
Intentional behavior is a basic property of intelligence and it incorporates the cyclic operation of prediction, testing by action, sensing, perceiving, and assimilating the exper...
Robert Kozma, Terry Huntsberger, Hrand Aghazarian,...