Sciweavers

1711 search results - page 66 / 343
» Completing pseudojump operators
Sort
View
FCCM
2003
IEEE
185views VLSI» more  FCCM 2003»
14 years 1 months ago
Implementation of a Content-Scanning Module for an Internet Firewall
A module has been implemented in Field Programmable Gate Array (FPGA) hardware that scans the content of Internet packets at Gigabit/second rates. All of the packet processing ope...
James Moscola, John W. Lockwood, Ronald Prescott L...
HOTOS
2003
IEEE
14 years 1 months ago
FAB: Enterprise Storage Systems on a Shoestring
Abstract—A Federated Array of Bricks (FAB) is a logical disk system that provides the reliability and performance of enterprise-class disk arrays, at a fraction of the cost and w...
Svend Frølund, Arif Merchant, Yasushi Saito...
ICRA
2002
IEEE
97views Robotics» more  ICRA 2002»
14 years 26 days ago
Orienting Micro-Scale Parts with Squeeze and Roll Primitives
Orienting parts that measure only a few micrometers in diameter introduces several challenges that need not be considered at the macro-scale. First, there are several kinds of sti...
Mark Moll, Kenneth Y. Goldberg, Michael Erdmann, R...
CPAIOR
2010
Springer
14 years 22 days ago
Strong Combination of Ant Colony Optimization with Constraint Programming Optimization
We introduce an approach which combines ACO (Ant Colony Optimization) and IBM ILOG CP Optimizer for solving COPs (Combinatorial Optimization Problems). The problem is modeled using...
Madjid Khichane, Patrick Albert, Christine Solnon
ICALP
2001
Springer
14 years 12 days ago
Symbolic Trace Analysis of Cryptographic Protocols
A cryptographic protocol can be described as a system of concurrent processes, and analysis of the traces generated by this system can be used to verify authentication and secrecy ...
Michele Boreale