Security analysis methods can provide correct yet meaningless results if the assumptions underlying the model do not conform to reality. We present an approach to analyze the secur...
Thomas Heyman, Riccardo Scandariato, Wouter Joosen
The deployment of IEC61850 standard in the world of substation automation system brings to the use of specific strategies for architecture testing. To validate IEC61850 architectur...
This work presents a dedicated hardware design for the Forward Quantization Module (Q module) of the H.264/AVC Video Coding Standard, using optimized multipliers. The goal of this...
Felipe Sampaio, Daniel Palomino, Robson Dornelles,...
Data centers have a crucial role in current Internet architecture supporting content-centric networking. State-of-theart data centers have different architectures like fat-tree [1...
In this paper, we describe an interactive streaming architecture. The content streamed by this architecture is encoded with the H.264/AVC standard for video compression. The archi...
The Jaccard/Tanimoto coefficient is an important workload, used in a large variety of problems including drug design fingerprinting, clustering analysis, similarity web searching a...
Vipin Sachdeva, Douglas M. Freimuth, Chris Mueller
In this paper, we propose an extension to the I/O device architecture, as recommended in the PCI-SIG IOV specification, for virtualizing network I/O devices. The aim is to enable ...
The workflow process is often executed in a dynamic environment. This dynamic is classified in several aspects. For this reason, several researches try to give workflow architectur...
Companies that are present at multiple online locations may have difficulty staffing them adequately in terms of helpdesk services with efficient use of human resources. In this pa...
Leonel Morgado, Paulo Reis, Fausto de Carvalho, Ti...
Abstract--Component-based development focuses on compose and composition: abstract components (as wished) must be searched for and matched to existing component (as found). This se...