Sciweavers

816 search results - page 91 / 164
» System-Level Power Performance Analysis for Embedded Systems...
Sort
View
SBCCI
2006
ACM
200views VLSI» more  SBCCI 2006»
14 years 3 months ago
REDEFIS: a system with a redefinable instruction set processor
The growing complexity and production cost of processor-based systems have imposed big constraints in SoC design of new systems. GPPs and ASICs are unable to fit the tight perform...
Victor M. Goulart Ferreira, Lovic Gauthier, Takayu...
JNW
2006
145views more  JNW 2006»
13 years 9 months ago
A Comparison of Replication Strategies for Reliable Decentralised Storage
Distributed hash tables (DHTs) can be used as the basis of a resilient lookup service in unstable environments: local routing tables are updated to reflected changes in the network...
Matthew Leslie, Jim Davies, Todd Huffman
IEEEARES
2006
IEEE
14 years 3 months ago
Replication Strategies for Reliable Decentralised Storage
Distributed hash tables (DHTs) can be used as the basis of a resilient lookup service in unstable environments: local routing tables are updated to reflected changes in the netwo...
Matthew Leslie, Jim Davies, Todd Huffman
JSAC
2008
112views more  JSAC 2008»
13 years 9 months ago
System Design Considerations for Undersea Networks: Link and Multiple Access Protocols
Abstract--We address several inter-related aspects of underwater network design within the context of a cross-layer approach. We first highlight the impact of key characteristics o...
Nathan Parrish, Leonard T. Tracy, Sumit Roy, Payma...
DRMTICS
2005
Springer
14 years 2 months ago
A Vector Approach to Cryptography Implementation
The current deployment of Digital Right Management (DRM) schemes to distribute protected contents and rights is leading the way to massive use of sophisticated embedded cryptograph...
Jacques J. A. Fournier, Simon W. Moore