Sciweavers

7189 search results - page 1105 / 1438
» Connecting Design with Code
Sort
View
CASES
2008
ACM
15 years 6 months ago
Compiling custom instructions onto expression-grained reconfigurable architectures
While customizable processors aim at combining the flexibility of general purpose processors with the speed and power advantages of custom circuits, commercially available process...
Paolo Bonzini, Giovanni Ansaloni, Laura Pozzi
CCS
2008
ACM
15 years 6 months ago
BootJacker: compromising computers using forced restarts
BootJacker is a proof-of-concept attack tool which demonstrates that authentication mechanisms employed by an operating system can be bypassed by obtaining physical access and sim...
Ellick Chan, Jeffrey C. Carlyle, Francis M. David,...
ATAL
2005
Springer
15 years 6 months ago
Rockwell automation agents for manufacturing
The paper provides an overview of the agent-based solutions developed by the Rockwell Automation company for the purposes of industrial control. Using agent-based manufacturing co...
Vladimír Marík, Pavel Vrba, Kenwood ...
CCGRID
2005
IEEE
15 years 6 months ago
The Composite Endpoint Protocol (CEP): scalable endpoints for terabit flows
We introduce the Composite Endpoint Protocol (CEP) which efficiently composes a set of transmission elements to support high speed flows which exceed the capabilities of a single...
Eric Weigle, Andrew A. Chien
153
Voted
PODC
2010
ACM
15 years 6 months ago
Brief announcement: revisiting the power-law degree distribution for social graph analysis
The study of complex networks led to the belief that the connectivity of network nodes generally follows a Power-law distribution. In this work, we show that modeling large-scale ...
Alessandra Sala, Haitao Zheng, Ben Y. Zhao, Sabrin...
« Prev « First page 1105 / 1438 Last » Next »