Sciweavers

1466 search results - page 138 / 294
» Efficient Simulation of Synthesis-Oriented System Level Desi...
Sort
View
NBIS
2009
Springer
15 years 11 months ago
A Survey of Security Middleware for Pervasive and Ubiquitous Systems
- Recently, pervasive and ubiquitous computing evolved tremendously and has become an integral part of many fields. This is widely attributed to their efficiency in integrating wit...
Jameela Al-Jaroodi, Alyaziyah Al-Dhaheri, Fatmah A...
BPM
2006
Springer
107views Business» more  BPM 2006»
15 years 8 months ago
On Representing, Purging, and Utilizing Change Logs in Process Management Systems
In recent years adaptive process management technolgy has emerged in order to increase the flexibility of business process implementations and to support process changes at differe...
Stefanie Rinderle, Manfred Reichert, Martin Jurisc...
TRIDENTCOM
2006
IEEE
15 years 10 months ago
Emulation versus simulation: A case study of TCP-targeted denial of service attacks
—In this paper, we investigate the applicability of simulation and emulation for denial of service (DoS) attack experimentation. As a case study, we consider low-rate TCP-targete...
Roman Chertov, Sonia Fahmy, Ness B. Shroff
DAC
2004
ACM
16 years 5 months ago
A novel approach for flexible and consistent ADL-driven ASIP design
Architecture description languages (ADL) have been established to aid the design of application-specific instruction-set processors (ASIP). Their main contribution is the automati...
Achim Nohl, Gunnar Braun, Hanno Scharwächter,...
DATE
2002
IEEE
95views Hardware» more  DATE 2002»
15 years 9 months ago
Window-Based Susceptance Models for Large-Scale RLC Circuit Analyses
Due to the increasing operating frequencies and the manner in which the corresponding integrated circuits and systems must be designed, the extraction, modeling and simulation of ...
Hui Zheng, Lawrence T. Pileggi, Michael W. Beattie...