Sciweavers

3031 search results - page 71 / 607
» Reuse in the application layer
Sort
View
ISCAS
2005
IEEE
154views Hardware» more  ISCAS 2005»
14 years 2 months ago
An automated methodology for memory-conscious mapping of DSP applications on coarse-grain reconfigurable arrays
—This paper presents a memory-conscious mapping methodology of computational intensive applications on coarse-grain reconfigurable arrays. By exploiting the inherent abundant amo...
Michalis D. Galanis, Gregory Dimitroulakos, Consta...
WIMOB
2008
IEEE
14 years 3 months ago
Multi-hop Cross-Layer Design in Wireless Sensor Networks: A Case Study
—Cross-layer design has been proposed as a promising paradigm to tackle various problems of wireless communication systems. Recent research has led to a variety of protocols that...
Philipp Hurni, Torsten Braun, Bharat K. Bhargava, ...
UML
2004
Springer
14 years 2 months ago
Behavioral Domain Analysis - The Application-Based Domain Modeling Approach
Being part of domain engineering, domain analysis enables identifying domains and capturing their ontologies in order to assist and guide system developers to design domain-specifi...
Iris Reinhartz-Berger, Arnon Sturm
LISA
2007
13 years 11 months ago
Secure Isolation of Untrusted Legacy Applications
Existing applications often contain security holes that are not patched until after the system has already been compromised. Even when software updates are available, applying the...
Shaya Potter, Jason Nieh, Matt Selsky
DRM
2004
Springer
14 years 2 months ago
DRM as a layered system
The current landscape for digital rights management (DRM) consists of various ad hoc technologies and platforms that largely focus on copy protection. The fragmented nature of the...
Pramod A. Jamkhedkar, Gregory L. Heileman