The general trend towards ubiquitous networking has reached the realm of airplanes. E-enabled airplanes with wired and wireless network interfaces offer a wide spectrum of network ...
Richard Robinson, Mingyan Li, Scott Lintelman, Kri...
In this work we propose a methodology for the accurate analysis of the power consumption of interprocessor communication in a MPSoC, and the construction of high-level power macro...
Software infrastructures and applications more and more must deal with data available in a variety of different storage engines, accessible through a multitude of protocols and in...
Marc Van Cappellen, Wouter Cordewiner, Carlo Innoc...
Background: The combination of mass spectrometry and solution phase amide hydrogen/deuterium exchange (H/D exchange) experiments is an effective method for characterizing protein ...
B. D. Pascal, M. J. Chalmers, S. A. Busby, C. C. M...
Access control software must be based on a security policy model. Flaws in them may come from a lack of precision or some incoherences in the policy model or from inconsistencies ...