Sciweavers

443 search results - page 72 / 89
» Continual flow pipelines
Sort
View
ICON
2007
IEEE
14 years 4 months ago
Lightweight Detection of DoS Attacks
Denial of Service (DoS) attacks have continued to evolve and they impact the availability of Internet infrastructure. Many researchers in the field of network security and system ...
Sirikarn Pukkawanna, Vasaka Visoottiviseth, Panita...
ISCAS
2007
IEEE
141views Hardware» more  ISCAS 2007»
14 years 4 months ago
Analog Emulation of a Reconfigurable Tap Changing Transformer
—Accurate analog models of power system components are required in order to realize an analog computation engine for power systems. Analog computation is an area of continued int...
Aaron St. Leger, Juan C. Jimenez, Agung Fu, Sanal ...
IWPC
2007
IEEE
14 years 4 months ago
Recovering Workflows from Multi Tiered E-commerce Systems
A workflow is a computerized specification of a business process. A workflow describes how tasks are executed and ordered following business policies. E-commerce systems implement...
Maokeng Hung, Ying Zou
ADC
2006
Springer
135views Database» more  ADC 2006»
14 years 4 months ago
Using a temporal constraint network for business process execution
Business process management (BPM) has emerged as a dominant technology in current enterprise systems and business solutions. However, the technology continues to face challenges i...
Ruopeng Lu, Shazia Wasim Sadiq, Vineet Padmanabhan...
DATE
2005
IEEE
117views Hardware» more  DATE 2005»
14 years 3 months ago
A Quality-of-Service Mechanism for Interconnection Networks in System-on-Chips
As Moore’s Law continues to fuel the ability to build ever increasingly complex system-on-chips (SoCs), achieving performance goals is rising as a critical challenge to completi...
Wolf-Dietrich Weber, Joe Chou, Ian Swarbrick, Drew...