Sciweavers

2763 search results - page 87 / 553
» The Dangerous 'All' in Specifications
Sort
View
DSD
2006
IEEE
159views Hardware» more  DSD 2006»
14 years 3 months ago
Deadlock Free Routing Algorithms for Mesh Topology NoC Systems with Regions
Region concept helps to accommodate cores larger than the tile size in mesh topology NoC architectures. In addition, it offers many new opportunities for NoC design, as well as pr...
Rickard Holsmark, Maurizio Palesi, Shashi Kumar
ISORC
2002
IEEE
14 years 2 months ago
Packaging Quality of Service Control Behaviors for Reuse
Two limitations of the current implementations of adaptive QoS behaviors are complexity associated with inserting them into common application contexts and lack of reusability acr...
Richard E. Schantz, Joseph P. Loyall, Michael Atig...
VLSID
1999
IEEE
91views VLSI» more  VLSID 1999»
14 years 1 months ago
Timed Circuit Synthesis Using Implicit Methods
The design and synthesis of asynchronous circuits is gaining importance in both the industrial and academic worlds. Timed circuits are a class of asynchronous circuits that incorp...
Robert Thacker, Wendy Belluomini, Chris J. Myers
EUROMICRO
2009
IEEE
14 years 1 months ago
Multi-layered Virtual Machines for Security Updates in Grid Environments
The use of user specific virtual machines (VMs) in Grid and Cloud computing reduces the administration overhead associated with manually installing required software for every user...
Roland Schwarzkopf, Matthias Schmidt, Niels Fallen...
CIKM
2006
Springer
14 years 29 days ago
Improving novelty detection for general topics using sentence level information patterns
The detection of new information in a document stream is an important component of many potential applications. In this work, a new novelty detection approach based on the identif...
Xiaoyan Li, W. Bruce Croft