Sciweavers

995 search results - page 136 / 199
» Wire-speed total order
Sort
View
126
Voted
ANCS
2007
ACM
15 years 7 months ago
Optimization of pattern matching algorithm for memory based architecture
Due to the advantages of easy re-configurability and scalability, the memory-based string matching architecture is widely adopted by network intrusion detection systems (NIDS). In...
Cheng-Hung Lin, Yu-Tang Tai, Shih-Chieh Chang
136
Voted
ARGMAS
2007
Springer
15 years 7 months ago
Preferences and Assumption-Based Argumentation for Conflict-Free Normative Agents
Argumentation can serve as an effective computational tool and as a useful abstraction for various agent activities and in particular for agent reasoning. In this paper we further ...
Dorian Gaertner, Francesca Toni
164
Voted
FCCM
2009
IEEE
134views VLSI» more  FCCM 2009»
15 years 7 months ago
Efficient Mapping of Hardware Tasks on Reconfigurable Computers Using Libraries of Architecture Variants
Scheduling and partitioning of task graphs on reconfigurable hardware needs to be carefully carried out in order to achieve the best possible performance. In this paper, we demons...
Miaoqing Huang, Vikram K. Narayana, Tarek A. El-Gh...
141
Voted
DELTA
2004
IEEE
15 years 7 months ago
Static Scheduling of Monoprocessor Real-Time Systems composed of Hard and Soft Tasks
In this report we address the problem of static scheduling of realtime systems that include both hard and soft tasks. We consider systems in which both hard and soft tasks are per...
Luis Alejandro Cortés, Petru Eles, Zebo Pen...
127
Voted
CRYPTO
2006
Springer
159views Cryptology» more  CRYPTO 2006»
15 years 7 months ago
Asymptotically Optimal Two-Round Perfectly Secure Message Transmission
Abstract. The problem of perfectly secure message transmission concerns two synchronized non-faulty processors sender (S) and receiver (R) that are connected by a synchronous netwo...
Saurabh Agarwal, Ronald Cramer, Robbert de Haan