Sciweavers

1928 search results - page 289 / 386
» Integrity Constraints in OWL
Sort
View
SLE
2009
Springer
14 years 4 months ago
A Role-Based Approach towards Modular Language Engineering
Modularisation can reduce the effort in designing and maintaining language specifications. Existing approaches to language modularisation are typically either focused on language ...
Christian Wende, Nils Thieme, Steffen Zschaler
ISLPED
2009
ACM
125views Hardware» more  ISLPED 2009»
14 years 4 months ago
Behavior-level observability don't-cares and application to low-power behavioral synthesis
Many techniques for power management employed in advanced RTL synthesis tools rely explicitly or implicitly on observability don’t-care (ODC) conditions. In this paper we presen...
Jason Cong, Bin Liu, Zhiru Zhang
WOWMOM
2009
ACM
157views Multimedia» more  WOWMOM 2009»
14 years 4 months ago
The CHIANTI architecture for robust mobile Internet access
The quality of Internet access for mobile users may suffer from highly variable communication characteristics (packet loss, delay, throughput) and from temporary disconnections. T...
Jörg Ott, Petri Ylikoski, Nils Seifert, Caleb...
AFRICACRYPT
2010
Springer
14 years 4 months ago
Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices
The market for RFID technology has grown rapidly over the past few years. Going along with the proliferation of RFID technology is an increasing demand for secure and privacy-prese...
Marcel Medwed, François-Xavier Standaert, J...
DATE
2008
IEEE
85views Hardware» more  DATE 2008»
14 years 4 months ago
Video Processing Requirements on SoC Infrastructures
Applications from the embedded consumer domain put challenging requirements on SoC infrastructures, i.e. interconnect and memory. Specifically, video applications demand large sto...
Pieter van der Wolf, Tomas Henriksson