Sciweavers

18306 search results - page 3119 / 3662
» Algorithmics in Exponential Time
Sort
View
PDP
2005
IEEE
15 years 10 months ago
Memory Bandwidth Aware Scheduling for SMP Cluster Nodes
Clusters of SMPs are becoming increasingly common. However, the shared memory design of SMPs and the consequential contention between system processors for access to main memory c...
Evangelos Koukis, Nectarios Koziris
RTCSA
2005
IEEE
15 years 10 months ago
FPGA-Based Content Protection System for Embedded Consumer Electronics
We propose a new architecture for a content protection system that conceals confidential data and algorithms in an FPGA as electrical circuits. This architecture is designed for a...
Hiroyuki Yokoyama, Kenji Toda
136
Voted
SP
2005
IEEE
104views Security Privacy» more  SP 2005»
15 years 10 months ago
On Safety in Discretionary Access Control
An apparently prevailing myth is that safety is undecidable in Discretionary Access Control (DAC); therefore, one needs to invent new DAC schemes in which safety analysis is decid...
Ninghui Li, Mahesh V. Tripunitara
SYNASC
2005
IEEE
170views Algorithms» more  SYNASC 2005»
15 years 10 months ago
Density Based Clustering with Crowding Differential Evolution
The aim of this work is to analyze the applicability of crowding differential evolution to unsupervised clustering. The basic idea of this approach, interpreting the clustering pr...
Daniela Zaharie
151
Voted
VLSID
2005
IEEE
120views VLSI» more  VLSID 2005»
15 years 10 months ago
On Finding Consecutive Test Vectors in a Random Sequence for Energy-Aware BIST Design
During pseudorandom testing, a significant amount of energy and test application time is wasted for generating and for applying “useless” test vectors that do not contribute t...
Sheng Zhang, Sharad C. Seth, Bhargab B. Bhattachar...
« Prev « First page 3119 / 3662 Last » Next »