Customizing architectures for particular applications is a promising approach to yield highly energy-efficient designs for embedded systems. This work explores the benefits of arc...
Several authors have proposed using code modification as a technique for enforcing security policies such as resource limits, access controls, and network information flows. Howeve...
As the scope of personal data grows, it becomes increasingly difficult to find what we need when we need it. Desktop search tools provide a potential answer, but most existing too...
Sam Shah, Craig A. N. Soules, Gregory R. Ganger, B...
This paper describes an effort of testing the Core Manufacturing Simulation Data (CMSD) information model as a neutral data interface for a discrete event simulation model develop...
Scheduling is one of the key factors for semiconductor fabrication productivity. Objectives like lot cycle time and throughput must be optimized to push the technological developm...
Andreas Klemmt, Sven Horn, Gerald Weigert, Thomas ...