Sciweavers

9842 search results - page 1855 / 1969
» Compositional timing analysis
Sort
View
CODES
2007
IEEE
14 years 4 months ago
Three-dimensional multiprocessor system-on-chip thermal optimization
3D stacked wafer integration has the potential to improve multiprocessor system-on-chip (MPSoC) integration density, performance, and power efficiency. However, the power density...
Chong Sun, Li Shang, Robert P. Dick
CSFW
2007
IEEE
14 years 4 months ago
Creating Vulnerability Signatures Using Weakest Preconditions
Signature-based tools such as network intrusion detection systems are widely used to protect critical systems. Automatic signature generation techniques are needed to enable these...
David Brumley, Hao Wang, Somesh Jha, Dawn Xiaodong...
CVPR
2007
IEEE
14 years 4 months ago
Visual Event Recognition in News Video using Kernel Methods with Multi-Level Temporal Alignment
In this work, we systematically study the problem of visual event recognition in unconstrained news video sequences. We adopt the discriminative kernel-based method for which vide...
Dong Xu, Shih-Fu Chang
GLOBECOM
2007
IEEE
14 years 4 months ago
Dynamic Multipath Onion Routing in Anonymous Peer-To-Peer Overlay Networks
— Although recent years provided many protocols for anonymous routing in overlay networks, they commonly rely on the same communication paradigm: Onion Routing. In Onion Routing ...
Olaf Landsiedel, Lexi Pimenidis, Klaus Wehrle, Hei...
ICC
2007
IEEE
139views Communications» more  ICC 2007»
14 years 4 months ago
Impatient Backoff Algorithm: Fairness in a Distributed Ad-Hoc MAC
— Many distributed multiple access (MAC) protocols use an exponential backoff mechanism. In that mechanism, a node picks a random backoff time uniformly in an interval that doubl...
Rajarshi Gupta, Jean C. Walrand
« Prev « First page 1855 / 1969 Last » Next »