Sciweavers

617 search results - page 76 / 124
» On the design of hybrid peer-to-peer systems
Sort
View
RSP
2003
IEEE
149views Control Systems» more  RSP 2003»
14 years 28 days ago
Rapid Scheduling of Efficient VLSI Architectures for Next-Generation HSDPA
In this paper, an efficient design flow integrating Mentor Graphics Precesion C and HDL designer is derived. In this hybrid prototyping environment, efficient FPGA architectures a...
Yuanbin Guo, Gang Xu, Dennis McCain, Joseph R. Cav...
HYBRID
2010
Springer
14 years 23 days ago
Safe compositional network sketches: formal framework
NetSketch is a tool for the specification of constrained-flow applications and the certification of desirable safety properties imposed thereon. NetSketch assists system integr...
Azer Bestavros, Assaf J. Kfoury, Andrei Lapets, Mi...
GECCO
2004
Springer
121views Optimization» more  GECCO 2004»
14 years 1 months ago
Vulnerability Analysis of Immunity-Based Intrusion Detection Systems Using Evolutionary Hackers
Artificial Immune Systems (AISs) are biologically inspired problem solvers that have been used successfully as intrusion detection systems (IDSs). This paper describes how the des...
Gerry V. Dozier, Douglas Brown, John Hurley, Kryst...
IROS
2009
IEEE
123views Robotics» more  IROS 2009»
14 years 2 months ago
2.5D infrared range and bearing system for collective robotics
— In the growing field of collective robotics, spatial co-ordination between robots is often critical and usually achieved via local relative positioning sensors. We believe tha...
James F. Roberts, Timothy S. Stirling, Jean-Christ...
RTAS
2008
IEEE
14 years 2 months ago
Incorporating Resource Safety Verification to Executable Model-based Development for Embedded Systems
This paper formulates and illustrates the integration of resource safety verification into a design methodology for development of verified and robust real-time embedded systems. ...
Jianliang Yi, Honguk Woo, James C. Browne, Aloysiu...