Sciweavers

7274 search results - page 149 / 1455
» Abstractions for network update
Sort
View
FPL
2008
Springer
112views Hardware» more  FPL 2008»
15 years 7 months ago
Secure FPGA configuration architecture preventing system downgrade
In the context of FPGAs, system downgrade consists in preventing the update of the hardware configuration or in replaying an old bitstream. The objective can be to preclude a syst...
Benoît Badrignans, Reouven Elbaz, Lionel Tor...
MASCOTS
1993
15 years 6 months ago
Simulation Modeling of Weak-Consistency Protocols
: Weak-consistency replication protocols can be used to build wide-area services that are scalable, fault-tolerant, and useful for mobile computer systems. We have evaluated the ti...
Richard A. Golding, Darrell D. E. Long
169
Voted
SASN
2005
ACM
15 years 11 months ago
Coordinated sensor deployment for improving secure communications and sensing coverage
Sensor network has a great potential in applications such as habitat monitoring, wildlife tracking, building surveillance, and military combat. The design of a sensor network syst...
Yinian Mao, Min Wu
APLAS
2007
ACM
15 years 9 months ago
A Systematic Approach to Probabilistic Pointer Analysis
Abstract. We present a formal framework for syntax directed probabilistic program analysis. Our focus is on probabilistic pointer analysis. We show how to obtain probabilistic poin...
Alessandra Di Pierro, Chris Hankin, Herbert Wiklic...
174
Voted
WIOPT
2011
IEEE
14 years 9 months ago
Distributed function computation in networks: A joint delay-energy perspective
Abstract—This paper considers the following network computation problem:
Nikhil Karamchandani, Massimo Franceschetti