Sciweavers

2663 search results - page 33 / 533
» The Design, Implementation, and Evaluation of Jade
Sort
View
ISCIS
2003
Springer
14 years 18 days ago
Design and Evaluation of a Source Routed Ad Hoc Network
Effects of network parameters on the performance of mobile ad hoc networks (MANETs) have been widely investigated. However, there are certain issues related to the hardware implem...
Faysal Basci, Hakan Terzioglu, Taskin Koçak
DAC
2007
ACM
14 years 8 months ago
Synchronous Elastic Circuits with Early Evaluation and Token Counterflow
A protocol for latency-insensitive design with early evaluation is presented. The protocol is based on a symmetric view of the system in which tokens carrying information move in ...
Jordi Cortadella, Michael Kishinevsky
HAIS
2009
Springer
14 years 1 days ago
A Generic and Extendible Multi-Agent Data Mining Framework
A generic and extendible Multi-Agent Data Mining (MADM) framework, EMADS (the Extendible Multi-Agent Data mining System) is described. The central feature of the framework is that ...
Kamal Ali Albashiri, Frans Coenen
SEUS
2005
IEEE
14 years 1 months ago
A Case Study on Partial Evaluation in Embedded Software Design
Source code generators are often applied in embedded systems design to combine the flexibility necessary for reusability with the performance of highly specialized software. Howe...
Michael Jung, Ralf Laue 0002, Sorin A. Huss
CHES
2005
Springer
109views Cryptology» more  CHES 2005»
14 years 29 days ago
Security Evaluation Against Electromagnetic Analysis at Design Time
Electromagnetic analysis (EMA) can be used to compromise secret information by analysing the electric and/or magnetic fields emanating from a device. It follows differential power...
Huiyun Li, A. Theodore Markettos, Simon W. Moore