Sciweavers

1272 search results - page 28 / 255
» Implementation of Bitmap Based Incognito and Performance Eva...
Sort
View
DFT
2000
IEEE
119views VLSI» more  DFT 2000»
14 years 1 months ago
An Experimental Evaluation of the Effectiveness of Automatic Rule-Based Transformations for Safety-Critical Applications
1 Over the last years, an increasing number of safety-critical tasks have been demanded to computer systems. In particular, safety-critical computer-based applications are hitting ...
Maurizio Rebaudengo, Matteo Sonza Reorda, Marco To...
VTC
2010
IEEE
102views Communications» more  VTC 2010»
13 years 7 months ago
Trace-Based Evaluation of Rate Adaptation Schemes in Vehicular Environments
Abstract—There has been a variety of rate adaptation solutions proposed for both indoor and mobile scenarios. However, dynamic channel changing conditions (e.g., temporal channel...
Kevin C. Lee, Juan M. Navarro, Tin Y. Chong, Uichi...
USENIX
1993
13 years 10 months ago
A Library Implementation of POSIX Threads under UNIX
Recently, there has been an effort to specify an IEEE standard for portable operating systems for open systems, called POSIX. One part of it, the POSIX 1003.4a threads extension (...
Frank Mueller
FPGA
2008
ACM
161views FPGA» more  FPGA 2008»
13 years 10 months ago
Implementing high-speed string matching hardware for network intrusion detection systems
This paper presents high-throughput techniques for implementing FSM based string matching hardware on FPGAs. By taking advantage of the fact that string matching operations for di...
Atul Mahajan, Benfano Soewito, Sai K. Parsi, Ning ...
POPL
1996
ACM
14 years 1 months ago
A Provably Time-Efficient Parallel Implementation of Full Speculation
that defines abstract costs for measuring or analyzing the performance of computations, (2) to supply the users with a mapping of these costs onto runtimes on various machine model...
John Greiner, Guy E. Blelloch