As IC technologies scale to finer feature sizes, it becomes increasingly difficult to control the relative process variations. The increasing fluctuations in manufacturing process...
The use of dynamic access control policies for threat response adapts local response decisions to high level system constraints. However, security policies are often carefully tigh...
Object replication and cache consistency have been one of major design issues in the recent Internet applications. In this paper, we forcus on accuracy-aware applications (i.e., s...
This paper deals with the modelling and evaluation of mission-phased systems devoted to space applications. We propose a two level hierarchical method that allows to model such sy...
ABSTRACT. We prove the so-called generalized Haff's law yielding the optimal algebraic cooling rate of the temperature of a granular gas described by the homogeneous Boltzmann...