Sciweavers

1440 search results - page 258 / 288
» Third-Party Flow Control
Sort
View
COMPSEC
2008
116views more  COMPSEC 2008»
13 years 11 months ago
Enforcing memory policy specifications in reconfigurable hardware
While general-purpose processor based systems are built to enforce memory protection to prevent the unintended sharing of data between processes, current systems built around reco...
Ted Huffmire, Timothy Sherwood, Ryan Kastner, Timo...
EL
2008
166views more  EL 2008»
13 years 11 months ago
The digital library as an enterprise: the Zachman approach
Purpose: Examines the needs of digital library stakeholders and how a collaborative digital library might be designed to meet these needs. The collaborative digital library has be...
Abdullah Abrizah, A. N. Zainab
ENGL
2008
85views more  ENGL 2008»
13 years 11 months ago
Prediction of Concentration Profiles of Dispersed Particles through Horizontal Cylindrical Channels
Deposition of dispersed and ultradispersed solid particles in cylindrical channels has received considerable attention due to its practical significance and direct application in i...
Herbert Loria Molina, Pedro Pereira-Almao, Carlos ...
CCR
2006
148views more  CCR 2006»
13 years 11 months ago
NetScale: scalable time-stepped hybrid simulation of large IP networks
This paper presents a scalable time-stepped hybrid simulation algorithm which is well adapted to the simulation of large IP networks (up to one million of competing flows and netw...
Laurent Fournié, Dohy Hong, Florent Perisse
COMSIS
2007
128views more  COMSIS 2007»
13 years 11 months ago
Constructing program animations using a pattern-based approach
The aim of this paper is to discuss how our pattern-based strategy for the visualization of data and control flow can effectively be used to animate the program and exhibit its beh...
Daniela Carneiro da Cruz, Pedro Rangel Henriques, ...