Sciweavers

173 search results - page 20 / 35
» Exploiting the Capabilities of Communications Co-Processors
Sort
View
CCS
2007
ACM
14 years 2 months ago
Detecting covert timing channels: an entropy-based approach
The detection of covert timing channels is of increasing interest in light of recent practice on the exploitation of covert timing channels over the Internet. However, due to the ...
Steven Gianvecchio, Haining Wang
DFT
2003
IEEE
99views VLSI» more  DFT 2003»
14 years 1 months ago
Dependability Analysis of CAN Networks: An Emulation-Based Approach
1 Today many safety-critical applications are based on distributed systems where several computing nodes exchange information via suitable network interconnections. An example of t...
J. Pérez, Matteo Sonza Reorda, Massimo Viol...
INFOCOM
2007
IEEE
14 years 2 months ago
Cooperating with Smartness: Using Heterogeneous Smart Antennas in Ad-Hoc Networks
Abstract— The ability of smart antennas to improve performance in a typically constrained ad-hoc network environment, has helped them garner significant attention over the last ...
Karthikeyan Sundaresan, Raghupathy Sivakumar
IJES
2006
110views more  IJES 2006»
13 years 8 months ago
Partitioning bin-packing algorithms for distributed real-time systems
Embedded real-time systems must satisfy not only logical functional requirements but also para-functional properties such as timeliness, Quality of Service (QoS) and reliability. W...
Dionisio de Niz, Raj Rajkumar
ICCAD
2003
IEEE
123views Hardware» more  ICCAD 2003»
14 years 5 months ago
The Y-Architecture for On-Chip Interconnect: Analysis and Methodology
The Y-architecture for on-chip interconnect is based on pervasive use of 0-, 120-, and 240-degree oriented semi-global and global wiring. Its use of three uniform directions explo...
Hongyu Chen, Chung-Kuan Cheng, Andrew B. Kahng, Io...