Sciweavers

159 search results - page 26 / 32
» Data-Driven Performance Analysis of Scheduled Processes
Sort
View
ACSAC
2002
IEEE
15 years 3 months ago
Composable Tools For Network Discovery and Security Analysis
Security analysis should take advantage of a reliable knowledge base that contains semantically-rich information about a protected network. This knowledge is provided by network m...
Giovanni Vigna, Fredrik Valeur, Jingyu Zhou, Richa...
CCGRID
2005
IEEE
15 years 4 months ago
Mapping DAG-based applications to multiclusters with background workload
Before an application modelled as a Directed Acyclic Graph (DAG) is executed on a heterogeneous system, a DAG mapping policy is often enacted. After mapping, the tasks (in the DAG...
Ligang He, Stephen A. Jarvis, Daniel P. Spooner, D...
ISSS
1996
IEEE
169views Hardware» more  ISSS 1996»
15 years 2 months ago
The Use of a Virtual Instruction Set for the Software Synthesis of HW/SW Embedded Systems
The application range of the embedded computing is going to cover the majority of the market products spanning from consumer electronic, automotive, telecom and process control. F...
Alessandro Balboni, William Fornaciari, M. Vincenz...
79
Voted
WSC
1997
14 years 11 months ago
Eagle View: A Simulation Tool for Wing Operations
This paper highlights a project performed by TASC for Armstrong Laboratories, Wright-Patterson AFB. This project describes a simulation tool to help wing-level planners at an Air ...
Eric A. Zahn, Kerris J. Renken
DAC
2003
ACM
15 years 11 months ago
Design flow for HW / SW acceleration transparency in the thumbpod secure embedded system
This paper describes a case study and design flow of a secure embedded system called ThumbPod, which uses cryptographic and biometric signal processing acceleration. It presents t...
David Hwang, Bo-Cheng Lai, Patrick Schaumont, Kazu...