Sciweavers

589 search results - page 77 / 118
» Design and Implementation of an SSL Component Based on CBD
Sort
View
MMMACNS
2005
Springer
15 years 5 months ago
A Modal Logic for Role-Based Access Control
Making correct access-control decisions is central to security, which in turn requires accounting correctly for the identity, credentials, roles, authority, and privileges of users...
Thumrongsak Kosiyatrakul, Susan Older, Shiu-Kai Ch...
CSREAESA
2008
15 years 1 months ago
A Middleware for Model-Based Embedded Systems
To deal with the increasing complexity of embedded real-time systems the model-driven development approach has proven to be beneficial. The reduction of complexity achieved by the ...
Wolfgang Haberl, Jan Birke, Uwe Baumgarten
NOCS
2010
IEEE
14 years 9 months ago
Addressing Manufacturing Challenges with Cost-Efficient Fault Tolerant Routing
Abstract--The high-performance computing domain is enriching with the inclusion of Networks-on-chip (NoCs) as a key component of many-core (CMPs or MPSoCs) architectures. NoCs face...
Samuel Rodrigo, Jose Flich, Antoni Roca, Simone Me...
IASTEDSE
2004
15 years 1 months ago
Targeted messages in indoor mobile environment: A software - oriented approach
Considering the advances of wireless, mobile and positioning technologies and the high requirement of the mobile marketing world for reaching as many customers as possible in a pe...
Angeliki Tsilira, Adamantia G. Pateli, Erast Athan...
GLVLSI
2006
IEEE
193views VLSI» more  GLVLSI 2006»
15 years 5 months ago
Optimizing noise-immune nanoscale circuits using principles of Markov random fields
As CMOS devices and operating voltages are scaled down, noise and defective devices will impact the reliability of digital circuits. Probabilistic computing compatible with CMOS o...
Kundan Nepal, R. Iris Bahar, Joseph L. Mundy, Will...