Sciweavers

70 search results - page 9 / 14
» Hardware software partitioning of operating systems: a behav...
Sort
View
AICCSA
2006
IEEE
143views Hardware» more  AICCSA 2006»
14 years 2 months ago
An Innovative Self-Configuration Approach for Networked Systems and Applications
The increased complexity, heterogeneity and the dynamism of networked systems and services make current control and management tools to be ineffective in managing and securing suc...
Huoping Chen, Salim Hariri, Fahd Rasul
SAC
2005
ACM
14 years 1 months ago
An agent model for fault-tolerant systems
This paper describes the use of fault tolerance in a multiagent system. Such an approach is based on the modeling of autonomous agents with planning capabilities. These capabiliti...
Avelino F. Zorzo, Felipe Rech Meneguzzi
CODES
2006
IEEE
14 years 2 months ago
Data reuse driven energy-aware MPSoC co-synthesis of memory and communication architecture for streaming applications
The memory subsystem of a complex multiprocessor systemson-chip (MPSoC) is an important contributor to the chip power consumption. The selection of memory architecture, as well as...
Ilya Issenin, Nikil Dutt
SAMOS
2007
Springer
14 years 2 months ago
An Evolutionary Approach to Area-Time Optimization of FPGA designs
—This paper presents a new methodology based on evolutionary multi-objective optimization (EMO) to synthesize multiple complex modules on programmable devices (FPGAs). It starts ...
Fabrizio Ferrandi, Pier Luca Lanzi, Gianluca Paler...
IEEEIAS
2009
IEEE
14 years 2 months ago
Fuzzy Intrusion Detection System via Data Mining Technique with Sequences of System Calls
: There are two main approaches for implementing IDS; Host based and Network based. While the former is implemented in form of software deployed on a host, the latter, usually is b...
Mohammad Akbarpour Sekeh, Mohd. Aizani Bin Maarof