Sciweavers

6031 search results - page 995 / 1207
» Communicating Transaction Processes
Sort
View
DATE
2008
IEEE
100views Hardware» more  DATE 2008»
15 years 10 months ago
Towards Trojan-Free Trusted ICs: Problem Analysis and Detection Scheme
There have been serious concerns recently about the security of microchips from hardware trojan horse insertion during manufacturing. This issue has been raised recently due to ou...
Francis G. Wolff, Christos A. Papachristou, Swarup...
119
Voted
DELTA
2008
IEEE
15 years 10 months ago
Testing of a Highly Reconfigurable Processor Core for Dependable Data Streaming Applications
The advances of CMOS technology towards 45 nm, the high costs of ASIC design, power limitations and fast changing application requirements have stimulated the usage of highly reco...
Hans G. Kerkhoff, Jarkko J. M. Huijts
GLOBECOM
2008
IEEE
15 years 10 months ago
Investigating the Performance Impact of Shared Host Capacity in Ad Hoc Networks
— Host resources (e.g., CPU time and buffer space) in mobile ad hoc networks must be shared between the devices own applications and networking functions, such as routing and pac...
Yan He, Ikhlas Ajbar, Van Nguyen, Dmitri Perkins
GLOBECOM
2008
IEEE
15 years 10 months ago
Robust Distributed Sensor Network Localization Based on Analysis of Flip Ambiguities
Abstract— A major problem in wireless sensor network localization is erroneous local geometric realizations in some parts of the network due to the sensitivity to certain distanc...
Anushiya A. Kannan, Baris Fidan, Guoqiang Mao
GLOBECOM
2008
IEEE
15 years 10 months ago
Networked Embedded Systems: A Quantitative Performance Comparison
— Networked embedded systems are gaining more and more attention and their use in current network scenarios is of indisputable importance. Research community and industry are pro...
Alessio Botta, Walter de Donato, Antonio Pescap&eg...