Sciweavers

1278 search results - page 88 / 256
» Architectures for Controller Based CDP
Sort
View
TSMC
2008
158views more  TSMC 2008»
13 years 10 months ago
Decentralized Inventory Control for Large-Scale Reverse Supply Chains: A Computationally Tractable Approach
In this paper, we consider a new inventory control technique for large-scale supply chains including repairs. The part flow is bidirectional with broken parts propagated upstream f...
Prashanth Krishnamurthy, Farshad Khorrami, David A...
WETICE
1998
IEEE
14 years 2 months ago
Using SESAME's GSS-API to add Security to Unix Applications
SESAME is a security architecture that starts from the Kerberos protocol and adds to it public-key based authentication, role based access control, delegation of rights and an ext...
Paul Ashley, Mark Vandenwauver, Mark Rutherford, S...
DATE
1999
IEEE
85views Hardware» more  DATE 1999»
14 years 2 months ago
At-Speed Boundary-Scan Interconnect Testing in a Board with Multiple System Clocks
As an at-speed solution to board-level interconnect testing, an enhanced boundary-scan architecture utilizing a combination of slightly modified boundary-scan cells and a user-def...
Jongchul Shin, Hyunjin Kim, Sungho Kang
NOCS
2009
IEEE
14 years 4 months ago
CTC: An end-to-end flow control protocol for multi-core systems-on-chip
We propose Connection then Credits (CTC) as a new end-to-end flow control protocol to handle messagedependent deadlocks in networks-on-chip (NoC) for multicore systems-on-chip. C...
Nicola Concer, Luciano Bononi, Michael Soulie, Ric...
AR
2008
188views more  AR 2008»
13 years 10 months ago
Intentional Control for Planetary Rover SRR
Intentional behavior is a basic property of intelligence and it incorporates the cyclic operation of prediction, testing by action, sensing, perceiving, and assimilating the exper...
Robert Kozma, Terry Huntsberger, Hrand Aghazarian,...