Sciweavers

1477 search results - page 213 / 296
» Token flow control
Sort
View
IEEEARES
2008
IEEE
14 years 4 months ago
Static Validation of Licence Conformance Policies
Policy conformance is a security property gaining importance due to commercial interest like Digital Rights Management. It is well known that static analysis can be used to valida...
René Rydhof Hansen, Flemming Nielson, Hanne...
MICRO
2008
IEEE
121views Hardware» more  MICRO 2008»
14 years 4 months ago
Temporal instruction fetch streaming
—L1 instruction-cache misses pose a critical performance bottleneck in commercial server workloads. Cache access latency constraints preclude L1 instruction caches large enough t...
Michael Ferdman, Thomas F. Wenisch, Anastasia Aila...
ISCC
2007
IEEE
131views Communications» more  ISCC 2007»
14 years 4 months ago
SIP and MIPv6: Cross-Layer Mobility
Terminal mobility may be handled at different layers. Though the MIPv6 protocol is the strongest candidate for handling mobility in next generation networks, mobility management f...
Rui Prior, Susana Sargento
ISPDC
2007
IEEE
14 years 4 months ago
Selection of Optimal Computing Platforms through the Suitability Measure
Selection of spaceborne computing platforms requires balance among several competing factors. Traditional performance analysis techniques are illsuited for this purpose due to the...
Shean T. McMahon, Isaac D. Scherson
COMPSAC
2006
IEEE
14 years 4 months ago
A Practical Approach for Automated Test Case Generation using Statecharts
This paper presents an approach for automated test case generation using a software specification modeled in Statecharts. The steps defined in such approach involve: translation o...
Valdivino A. Santiago, Ana Silvia Martins do Amara...