Sciweavers

2015 search results - page 233 / 403
» Hidden Software Capabilities
Sort
View
MOBICOM
1997
ACM
14 years 1 months ago
A Protection Scheme for Mobile Agents on Java
: This paper describes a protection scheme for mobile agents implemented on a Java environment. In this scheme, access to objects is controlled by means of software capabilities th...
Daniel Hagimont, Leila Ismail
DAC
1994
ACM
14 years 1 months ago
Synthesis of Instruction Sets for Pipelined Microprocessors
We present a systematic approach to synthesize an instruction set such that the given application software can be efficiently mapped to a parameterized, pipelined microarchitectur...
Ing-Jer Huang, Alvin M. Despain
ARC
2007
Springer
123views Hardware» more  ARC 2007»
14 years 1 months ago
Multiple Sequence Alignment Using Reconfigurable Computing
The alignment of multiple protein (or DNA) sequences is a current problem in Bioinformatics. ClustalW is the most popular heuristic algorithm for multiple sequence alignment. Pairw...
Carlos R. Erig Lima, Heitor S. Lopes, Maiko R. Mor...
ICOST
2010
Springer
14 years 1 months ago
Use Cases for Abnormal Behaviour Detection in Smart Homes
While people have many ideas about how a smart home should react to particular behaviours from their inhabitant, there seems to have been relatively little attempt to organise this...
An C. Tran, Stephen Marsland, Jens Dietrich, Hans ...
DAC
2010
ACM
14 years 1 months ago
Circuit modeling for practical many-core architecture design exploration
Current tools for computer architecture design lack standard support for multi- and many-core development. We propose using circuit models to describe the multiple processor archi...
Dean Truong, Bevan M. Baas