Sciweavers

433 search results - page 72 / 87
» An Overview of the VigilNet Architecture
Sort
View
ITP
2010
159views Mathematics» more  ITP 2010»
15 years 3 months ago
Programming Language Techniques for Cryptographic Proofs
CertiCrypt is a general framework to certify the security of cryptographic primitives in the Coq proof assistant. CertiCrypt adopts the code-based paradigm, in which the statement ...
Gilles Barthe, Benjamin Grégoire, Santiago ...
GROUP
2007
ACM
15 years 3 months ago
The story of a working workflow management system
This work presents experiences with the adopting of a workflow management system in a large financial institution. We describe the gradual evolution of a traditional work process,...
Steen Brahe, Kjeld Schmidt
BROADNETS
2006
IEEE
15 years 3 months ago
On Traffic Grooming Choices for IP over WDM networks
Traffic grooming continues to be a rich area of research in the context of WDM optical networks. We provide an overview of the optical and electronic grooming techniques available...
Srivatsan Balasubramanian, Arun K. Somani
ECAI
2000
Springer
15 years 3 months ago
The WITAS Unmanned Aerial Vehicle Project
The purpose of this paper is to provide a broad overview of the WITAS Unmanned Aerial Vehicle Project. The WITAS UAV project is an ambitious, long-term basic research project with ...
Patrik Dohrty, Gösta H. Granlund, Krzysztof K...
ASPDAC
2008
ACM
103views Hardware» more  ASPDAC 2008»
15 years 1 months ago
Reliability-aware design for nanometer-scale devices
Continuous transistor scaling due to improvements in CMOS devices and manufacturing technologies is increasing processor power densities and temperatures; thus, creating challenges...
David Atienza, Giovanni De Micheli, Luca Benini, J...