Sciweavers

384 search results - page 30 / 77
» Trust as dependence: a logical approach
Sort
View
ICCAD
2003
IEEE
127views Hardware» more  ICCAD 2003»
14 years 4 months ago
A Probabilistic-Based Design Methodology for Nanoscale Computation
As current silicon-based techniques fast approach their practical limits, the investigation of nanoscale electronics, devices and system architectures becomes a central research p...
R. Iris Bahar, Joseph L. Mundy, Jie Chen
ACSAC
1999
IEEE
14 years 7 days ago
Security Relevancy Analysis on the Registry of Windows NT 4.0
Many security breaches are caused by inappropriate inputs crafted by people with malicious intents. To enhance the system security, we need either to ensure that inappropriate inp...
Wenliang Du, Praerit Garg, Aditya P. Mathur
WSC
1997
13 years 9 months ago
A Simulation-Based Backward Planning Approach for Order-Release
The problem of order release planning for a make-toorder production facility is addressed. Traditionally, order-release planning in a multi-stage shop is performed with material r...
Edward F. Watson, Deborah J. Medeiros, Randall P. ...
HPCA
2006
IEEE
14 years 8 months ago
An approach for implementing efficient superscalar CISC processors
An integrated, hardware / software co-designed CISC processor is proposed and analyzed. The objectives are high performance and reduced complexity. Although the x86 ISA is targete...
Shiliang Hu, Ilhyun Kim, Mikko H. Lipasti, James E...
ADC
2004
Springer
88views Database» more  ADC 2004»
13 years 11 months ago
An Efficient Method for Indexing Now-relative Bitemporal data
Most modern database applications contain a significant amount of time dependent data and a substantial proportion of this data is now-relative, i.e. current now. While much resea...
Bela Stantic, Sankalp Khanna, John Thornton