Sciweavers

533 search results - page 72 / 107
» Control flow based obfuscation
Sort
View
SIGCOMM
2000
ACM
15 years 6 months ago
Trajectory sampling for direct traffic observation
Traffic measurement is a critical component for the control and engineering of communication networks. We argue that traffic measurement should make it possible to obtain the spati...
Nick G. Duffield, Matthias Grossglauser
135
Voted
BPM
2008
Springer
185views Business» more  BPM 2008»
15 years 4 months ago
Applying Patterns during Business Process Modeling
Although the business process community has put a major emphasis on patterns, notably the famous workflow patterns, only limited support for using patterns in today's business...
Thomas Gschwind, Jana Koehler, Janette Wong
108
Voted
PE
2006
Springer
130views Optimization» more  PE 2006»
15 years 2 months ago
Analysis of manufacturing blocking systems with Network Calculus
In this paper, the manufacturing blocking system (MBS) is studied from the Network Calculus (NetCal) perspective. By dominating an MBS by a window flow controller (WFC), we obtain...
Amit Bose, Xiaoyue Jiang, Bin Liu, Gang Li
142
Voted
DAC
2003
ACM
16 years 3 months ago
Clock-tree power optimization based on RTL clock-gating
As power consumption of the clock tree in modern VLSI designs tends to dominate, measures must be taken to keep it under control. This paper introduces an approach for reducing cl...
Monica Donno, Alessandro Ivaldi, Luca Benini, Enri...
DATE
2005
IEEE
171views Hardware» more  DATE 2005»
15 years 8 months ago
Access Pattern-Based Code Compression for Memory-Constrained Embedded Systems
As compared to a large spectrum of performance optimizations, relatively little effort has been dedicated to optimize other aspects of embedded applications such as memory space r...
Ozcan Ozturk, Hendra Saputra, Mahmut T. Kandemir, ...