Sciweavers

1658 search results - page 124 / 332
» Implementing Bit-addressing with Specialization
Sort
View
TMA
2010
Springer
206views Management» more  TMA 2010»
14 years 3 months ago
Collection and Exploration of Large Data Monitoring Sets Using Bitmap Databases
Collecting and exploring monitoring data is becoming increasingly challenging as networks become larger and faster. Solutions based on both SQL-databases and specialized binary for...
Luca Deri, Valeria Lorenzetti, Steve Mortimer
ESORICS
2009
Springer
14 years 3 months ago
Security Threat Mitigation Trends in Low-Cost RFID Systems
Abstract. The design and implementation of security threat mitigation mechanisms in RFID systems, specially in low-cost RFID tags, are gaining great attention in both industry and ...
Joaquín García-Alfaro, Michel Barbea...
WEA
2009
Springer
123views Algorithms» more  WEA 2009»
14 years 3 months ago
Algorithms and Experiments for Clique Relaxations-Finding Maximum s-Plexes
We propose new practical algorithms to find degree-relaxed variants of cliques called s-plexes. An s-plex denotes a vertex subset in a graph inducing a subgraph where every vertex...
Hannes Moser, Rolf Niedermeier, Manuel Sorge
DATE
2009
IEEE
136views Hardware» more  DATE 2009»
14 years 3 months ago
A file-system-aware FTL design for flash-memory storage systems
Abstract—As flash memory became popular over various platforms, there is a strong demand on the performance degradation problem, due to the special characteristics of flash mem...
Po-Liang Wu, Yuan-Hao Chang, Tei-Wei Kuo
DATE
2009
IEEE
123views Hardware» more  DATE 2009»
14 years 3 months ago
On decomposing Boolean functions via extended cofactoring
—We investigate restructuring techniques based on decomposition/factorization, with the objective to move critical signals toward the output while minimizing area. A specific ap...
Anna Bernasconi, Valentina Ciriani, Gabriella Truc...