: In order to investigate the impact of dynamic hardware reconfiguration on general-purpose applications, we present a superscalar micro-architecture that includes a variable numbe...
Abstract. Certificate-based authentication of parties provides a powerful means for verifying claimed identities, since communicating partners do not have to exchange secrets in ad...
Matthias Enzmann, Elli Giessler, Michael Haisch, B...
Abstract. Recently, flash memory is widely used in embedded applications since it has strong points: non-volatility, fast access speed, shock resistance, and low power consumption....
Tae-Sun Chung, Stein Park, Myung-Jin Jung, Bumsoo ...
Semantic Web is regarded as the next generation of the World Wide Web. It provides not only the structure of the web but also meaningful semantics for the information presented. T...
Yue Tang, Jin Song Dong, Jing Sun, Brendan P. Maho...
ISO 9001 is a standard for quality management systems while CMMI is a model for process improvement. If an organization that has achieved ISO registration wishes to improve proces...
Chanwoo Yoo, Junho Yoon, Byungjeong Lee, Chong-Won...
Many routing protocols for wireless sensor network have been proposed, with the purpose of achieving efficient routing. However, when the mobility increases rapidly and the networ...
Yuan Yang, Dong-hyun Lee, Myong-Soon Park, Hoh Pet...
Unit testing is a methodology for testing small parts of an application independently of whatever application uses them. It is time consuming and tedious to write unit tests, and ...
Approaches to enforcing communication integrity in the implementation, exemplified by ArchJava, consider only architectural constraints, without taking into account the late integ...
The notion of partial and evolutionary specification has gained attention both in research and industry in the last years. While many people regard this just as a process issue, w...