Abstract. Resource constrained systems often are programmed using an eventbased model. Many applications do not lend themselves well to an event-based approach, but preemptive mult...
This paper addresses the possibility that IP, in the role of the common service, is not as general as is needed in order to directly address application requirements, including sc...
Micah Beck, Ying Ding 0002, Terry Moore, James S. ...
With the advent of computational grids, networking performance over the wide-area network (WAN) has become a critical component in the grid infrastructure. Unfortunately, many hig...
— Intrusion detection System forms a vital component of internet security. To keep pace with the growing trends, there is a critical need to replace single layer detection techno...
In the paper a new approach to building a MOS threshold element and an arti cial neuron on its base is discussed. The implementability of the known MOS threshold elements is restri...