Sciweavers

503 search results - page 95 / 101
» Data Flow Analysis for CCS
Sort
View
IEEEIAS
2009
IEEE
13 years 5 months ago
An Improved Scheme of Single Sign-on Protocol
In order to avoid security threats caused by password attack and replay attack in single sign-on protocal, the most methods on sovling these issues are making use of complicated te...
Yang Jian
TWC
2010
13 years 2 months ago
Rex: A randomized EXclusive region based scheduling scheme for mmWave WPANs with directional antenna
Millimeter-wave (mmWave) transmissions are promising technologies for high data rate (multi-Gbps) Wireless Personal Area Networks (WPANs). In this paper, we first introduce the con...
Lin X. Cai, Lin Cai, Xuemin Shen, Jon W. Mark
NN
2008
Springer
150views Neural Networks» more  NN 2008»
13 years 7 months ago
Neural network based pattern matching and spike detection tools and services - in the CARMEN neuroinformatics project
In the study of information flow in the nervous system, component processes can be investigated using a range of electrophysiological and imaging techniques. Although data is diff...
Martyn Fletcher, Bojian Liang, Leslie Smith, Alast...
ICS
2009
Tsinghua U.
14 years 10 days ago
A comprehensive power-performance model for NoCs with multi-flit channel buffers
Large Multi-Processor Systems-on-Chip use Networks-on-Chip with a high degree of reusability and scalability for message communication. Therefore, network infrastructure is a cruc...
Mohammad Arjomand, Hamid Sarbazi-Azad
SIGSOFT
2007
ACM
14 years 8 months ago
Programming asynchronous layers with CLARITY
Asynchronous systems components are hard to write, hard to reason about, and (not coincidentally) hard to mechanically verify. In order to achieve high performance, asynchronous c...
Prakash Chandrasekaran, Christopher L. Conway, Jos...