Sciweavers

697 search results - page 126 / 140
» Implementation of Timed Automata: An Issue of Semantics or M...
Sort
View
PERVASIVE
2009
Springer
14 years 2 months ago
Securing RFID Systems by Detecting Tag Cloning
Cloning of RFID tags can lead to financial losses in many commercial RFID applications. There are two general strategies to provide security: prevention and detection. The securit...
Mikko Lehtonen, Daniel Ostojic, Alexander Ilic, Fl...
GLVLSI
2006
IEEE
185views VLSI» more  GLVLSI 2006»
14 years 1 months ago
Application of fast SOCP based statistical sizing in the microprocessor design flow
In this paper we have applied statistical sizing in an industrial setting. Efficient implementation of the statistical sizing algorithm is achieved by utilizing a dedicated interi...
Murari Mani, Mahesh Sharma, Michael Orshansky
HIPC
2004
Springer
14 years 23 days ago
Lock-Free Parallel Algorithms: An Experimental Study
Abstract. Lock-free shared data structures in the setting of distributed computing have received a fair amount of attention. Major motivations of lock-free data structures include ...
Guojing Cong, David A. Bader
SIGSOFT
2000
ACM
13 years 11 months ago
Extracting library-based object-oriented applications
In an increasingly popular model of software distribution, software is developed in one computing environment and deployed in other environments by transfer over the internet. Ext...
Peter F. Sweeney, Frank Tip
AAIM
2007
Springer
142views Algorithms» more  AAIM 2007»
13 years 11 months ago
Design of a Fuzzy PI Controller to Guarantee Proportional Delay Differentiation on Web Servers
PI controller has attracted researchers in industrial control processes because of its simplicity and robust performance in a wide range of operating conditions. It has been used t...
Ka Ho Chan, Xiaowen Chu