Sciweavers

1686 search results - page 171 / 338
» Higher Order Deforestation
Sort
View
MOBIQUITOUS
2007
IEEE
15 years 11 months ago
Diffusion-based Approach to Deploying Wireless Sensors to Satisfy Coverage, Connectivity and Reliability
An important objective of wireless sensor networks (WSNs) is to reliably sense data about the environment in which they are deployed. Reliability in WSNs has been widely studied in...
Renita Machado, Sirin Tekinay
TPHOL
2007
IEEE
15 years 11 months ago
Operational Reasoning for Concurrent Caml Programs and Weak Memory Models
This paper concerns the formal semantics of programming languages, and the specification and verification of software. We are interested in the verification of real programs, wr...
Tom Ridge
ATC
2007
Springer
15 years 10 months ago
An Approach to a Trustworthy System Architecture Using Virtualization
We present a system architecture for trusted transactions in highly sensitive environments. This architecture takes advantage of techniques provided by the Trusted Computing Group ...
Frederic Stumpf, Michael Benz, Martin Hermanowski,...
CHES
2007
Springer
328views Cryptology» more  CHES 2007»
15 years 10 months ago
High-Speed True Random Number Generation with Logic Gates Only
It is shown that the amount of true randomness produced by the recently introduced Galois and Fibonacci ring oscillators can be evaluated experimentally by restarting the oscillato...
Markus Dichtl, Jovan Dj. Golic
ESTIMEDIA
2007
Springer
15 years 10 months ago
Signature-based Microprocessor Power Modeling for Rapid System-level Design Space Exploration
This paper presents a technique for high-level power estimation of microprocessors. The technique, which is based on abstract execution profiles called ’event signatures’, op...
Peter van Stralen, Andy D. Pimentel