Sciweavers

1974 search results - page 280 / 395
» A Library System for Small-Scale Library
Sort
View
FM
2009
Springer
123views Formal Methods» more  FM 2009»
15 years 4 months ago
"Carbon Credits" for Resource-Bounded Computations Using Amortised Analysis
Abstract. Bounding resource usage is important for a number of areas, notably real-time embedded systems and safety-critical systems. In this paper, we present a fully automatic st...
Steffen Jost, Hans-Wolfgang Loidl, Kevin Hammond, ...
ETFA
2008
IEEE
15 years 4 months ago
Evaluation of Sequential Function Charts execution techniques. The Active Steps Algorithm
Programmable Logic Controllers (PLCs) play a significant role in the control of production systems and Sequential Function Chart (SFC) is one of the main programming languages. Th...
Ramon Piedrafita Moreno, José Luis Villarro...
IPPS
2008
IEEE
15 years 4 months ago
Lattice Boltzmann simulation optimization on leading multicore platforms
We present an auto-tuning approach to optimize application performance on emerging multicore architectures. The methodology extends the idea of searchbased performance optimizatio...
Samuel Williams, Jonathan Carter, Leonid Oliker, J...
AH
2008
Springer
15 years 4 months ago
Social Information Access for the Rest of Us: An Exploration of Social YouTube
The motivation behind many Information Retrieval systems is to identify and present relevant information to people given their current goals and needs. Learning about user preferen...
Maurice Coyle, Jill Freyne, Peter Brusilovsky, Bar...
DATE
2007
IEEE
92views Hardware» more  DATE 2007»
15 years 4 months ago
Overcoming glitches and dissipation timing skews in design of DPA-resistant cryptographic hardware
Cryptographic embedded systems are vulnerable to Differential Power Analysis (DPA) attacks. In this paper, we propose a logic design style, called as Precharge Masked Reed-Muller ...
Kuan Jen Lin, Shan Chien Fang, Shih Hsien Yang, Ch...