Sciweavers

4287 search results - page 105 / 858
» Assessing Architectural Complexity
Sort
View
120
Voted
WS
2005
ACM
15 years 9 months ago
The security of vehicular networks
Vehicular networks are likely to become the most relevant form of ad hoc networks. In this paper, we address the security of these networks. We provide a detailed threat analysis ...
Jean-Pierre Hubaux
107
Voted
ISPD
2003
ACM
73views Hardware» more  ISPD 2003»
15 years 8 months ago
Research directions for coevolution of rules and routers
Design rules in advanced IC manufacturing processes are increasingly problematic for modern router architectures and algorithms. This paper first reviews types and causes of “d...
Andrew B. Kahng
125
Voted
ICIP
1998
IEEE
16 years 5 months ago
Integration of Region Tracking and Optical Flow for Image Motion Estimation
Robust motion estimation is obtained by integrating optical flow and region tracking methods into a closedloop architecture. To ensure robust tracking over long intervals in video...
Ulrich Neumann, Suya You
117
Voted
ACSAC
2003
IEEE
15 years 9 months ago
PSOS Revisited
This paper provides a retrospective view of the design of SRI’s Provably Secure Operating System (PSOS), a formally specified tagged-capability hierarchical system architecture...
Peter G. Neumann, Richard J. Feiertag
ISCAS
1999
IEEE
115views Hardware» more  ISCAS 1999»
15 years 7 months ago
Novel high-radix residue number system multipliers and adders
Radix-r modulo rn multipliers and adders are introduced in this paper. The proposed architectures are shown to require several times less area than previously reported architectur...
Vassilis Paliouras, Thanos Stouraitis