Sciweavers

7066 search results - page 195 / 1414
» Contact Relations with Applications
Sort
View
DEXA
2007
Springer
96views Database» more  DEXA 2007»
15 years 10 months ago
Data Management in RFID Applications
Nowadays, RFID applications have attracted a great deal of interest due to their increasing adoptions in supply chain management, logistics and security. They have posed many new c...
Dan Lin, Hicham G. Elmongui, Elisa Bertino, Beng C...
CODES
2006
IEEE
15 years 10 months ago
Challenges in exploitation of loop parallelism in embedded applications
Embedded processors have been increasingly exploiting hardware parallelism. Vector units, multiple processors or cores, hyper-threading, special-purpose accelerators such as DSPs ...
Arun Kejariwal, Alexander V. Veidenbaum, Alexandru...
ISCAS
2005
IEEE
125views Hardware» more  ISCAS 2005»
15 years 10 months ago
A methodology for partitioning DSP applications in hybrid reconfigurable systems
—In this paper, we describe an automated and formalized methodology for partitioning computational intensive applications between reconfigurable hardware blocks of different gran...
Michalis D. Galanis, Athanasios Milidonis, George ...
COMPSAC
2003
IEEE
15 years 9 months ago
A Multi-Agent Software Environment for Testing Web-based Applications
This paper presents an agent-based software environment for testing web-based applications. The infrastructure of the system consists of a lightweight agent platform that supports...
Qingning Huo, Hong Zhu, Sue Greenwood
FPL
2003
Springer
88views Hardware» more  FPL 2003»
15 years 9 months ago
How Secure Are FPGAs in Cryptographic Applications?
The use of FPGAs for cryptographic applications is highly attractive for a variety of reasons but at the same time there are many open issues related to the general security of FPG...
Thomas J. Wollinger, Christof Paar