Sciweavers

879 search results - page 103 / 176
» Designing Closer to the Edge
Sort
View
ECBS
2008
IEEE
86views Hardware» more  ECBS 2008»
14 years 3 months ago
A Formal Model for Network-Wide Security Analysis
Network designers perform challenging tasks with so many configuration options that it is often hard or even impossible for a human to predict all potentially dangerous situation...
Petr Matousek, Jaroslav Ráb, Ondrej Rysavy,...
ISCAS
2007
IEEE
134views Hardware» more  ISCAS 2007»
14 years 3 months ago
4.7pJ/pulse 7th Derivative Gaussian Pulse Generator for Impulse Radio UWB
Abstract—This paper presents a ultra low-power, lowcomplexity circuit to generate the monocycle pulse for Impulse Radio UWB (IR-UWB) applications. A 7th order derivative Gaussian...
Tuan-Anh Phan, Vladimir Krizhanovskii, Seok-Kyun H...
SAINT
2007
IEEE
14 years 3 months ago
High Availability and Scalability Support for Web Applications
A database query caching technique, GlobeCBC, can be used to improve the scalability of Web applications. This paper addresses the availability issues in GlobeCBC. Even though hig...
Louis Rilling, Swaminathan Sivasubramanian, Guilla...
ER
2007
Springer
101views Database» more  ER 2007»
14 years 3 months ago
Using Attributed Goal Graphs for Software Component Selection: An Application of Goal-Oriented Analysis to Decision Making
During software requirements analysis and design steps, developers and stakeholders have many alternatives of artifacts such as software component selection and should make decisi...
Kazuma Yamamoto, Motoshi Saeki
MIRAGE
2007
Springer
14 years 3 months ago
A Note on the Discrete Binary Mumford-Shah Model
Abstract. This paper is concerned itself with the analysis of the twophase Mumford-Shah model also known as the active contour without edges model introduced by Chan and Vese. It c...
Jérôme Darbon