Sciweavers

271 search results - page 24 / 55
» From Trust to Dependability through Risk Analysis
Sort
View
DATE
2005
IEEE
158views Hardware» more  DATE 2005»
14 years 1 months ago
Modeling and Analysis of Loading Effect in Leakage of Nano-Scaled Bulk-CMOS Logic Circuits
In nanometer scaled CMOS devices significant increase in the subthreshold, the gate and the reverse biased junction band-toband-tunneling (BTBT) leakage, results in the large incr...
Saibal Mukhopadhyay, Swarup Bhunia, Kaushik Roy
CJ
2006
84views more  CJ 2006»
13 years 7 months ago
Instruction Level Parallelism through Microthreading - A Scalable Approach to Chip Multiprocessors
Most microprocessor chips today use an out-of-order instruction execution mechanism. This mechanism allows superscalar processors to extract reasonably high levels of instruction ...
Kostas Bousias, Nabil Hasasneh, Chris R. Jesshope
GECON
2007
Springer
108views Business» more  GECON 2007»
14 years 1 months ago
Strategies for the Service Market Place
We describe a number of strategies for a future service oriented market place. We describe the SLA’s role within the service framework, and how it enables customers to make value...
Paul McKee, Steve Taylor, Mike Surridge, Richard L...
TROB
2010
88views more  TROB 2010»
13 years 6 months ago
Proxy-Based Sliding Mode Control: A Safer Extension of PID Position Control
—High-gain proportional–integral–derivative (PID) position control involves some risk of unsafe behaviors in cases of abnormal events, such as unexpected environment contacts...
Ryo Kikuuwe, S. Yasukouchi, Hideo Fujimoto, Motoji...
ER
2004
Springer
169views Database» more  ER 2004»
14 years 1 months ago
Intentional Modeling to Support Identity Management
Identity management has arisen as a major and urgent challenge for internet-based communications and information services. Internet services involve complex networks of relationshi...
Lin Liu, Eric S. K. Yu