Sciweavers

2416 search results - page 60 / 484
» The design and implementation of typed scheme
Sort
View
ISORC
1999
IEEE
14 years 1 months ago
Implementing the Real-Time Publisher/Subscriber Model on the Controller Area Network (CAN)
Designing distributed real-time systems as being composed of communicating objects offers many advantages with respect to modularity and extensibility of these systems. However, d...
Jörg Kaiser, Michael Mock
SC
2009
ACM
14 years 3 months ago
Allocator implementations for network-on-chip routers
The present contribution explores the design space for virtual channel (VC) and switch allocators in network-on-chip (NoC) routers. Based on detailed RTL-level implementations, we...
Daniel U. Becker, William J. Dally
SACMAT
2004
ACM
14 years 2 months ago
Implementing access control to people location information
Ubiquitous computing uses a variety of information for which access needs to be controlled. For instance, a person’s current location is a sensitive piece of information, which ...
Urs Hengartner, Peter Steenkiste
NETGAMES
2005
ACM
14 years 2 months ago
FreeRank: implementing independent ranking service for multiplayer online games
Ranking is necessary for multiplayer online games to provide players with self-complacence and reference for choosing game counterparts. Most existing ranking solutions are tightl...
Li Tang, Jun Li, Jin Zhou, Zhizhi Zhou, Hao Wang, ...
IWNAS
2008
IEEE
14 years 3 months ago
A Novel Embedded Accelerator for Online Detection of Shrew DDoS Attacks
∗ As one type of stealthy and hard-to-detect attack, lowrate TCP-targeted DDoS attack can seriously throttle the throughput of normal TCP flows for a long time without being noti...
Hao Chen, Yu Chen