Sciweavers

1424 search results - page 183 / 285
» Experiences on Designing an Integral Intrusion Detection Sys...
Sort
View
ATVA
2007
Springer
134views Hardware» more  ATVA 2007»
15 years 5 months ago
Formal Modeling and Verification of High-Availability Protocol for Network Security Appliances
One of the prerequisites for information society is secure and reliable communication among computing systems. Accordingly, network security appliances become key components of inf...
Moonzoo Kim
DAC
2010
ACM
15 years 2 days ago
SCEMIT: a systemc error and mutation injection tool
As high-level models in C and SystemC are increasingly used for verification and even design (through high-level synthesis) of electronic systems, there is a growing need for com...
Peter Lisherness, Kwang-Ting (Tim) Cheng
112
Voted
BMCBI
2008
163views more  BMCBI 2008»
15 years 1 months ago
The Annotation, Mapping, Expression and Network (AMEN) suite of tools for molecular systems biology
Background: High-throughput genome biological experiments yield large and multifaceted datasets that require flexible and user-friendly analysis tools to facilitate their interpre...
Frédéric Chalmel, Michael Primig
DAC
2004
ACM
16 years 2 months ago
Memory access scheduling and binding considering energy minimization in multi-bank memory systems
Memory-related activity is one of the major sources of energy consumption in embedded systems. Many types of memories used in embedded systems allow multiple operating modes (e.g....
Chun-Gi Lyuh, Taewhan Kim
SIGMOD
2010
ACM
255views Database» more  SIGMOD 2010»
15 years 6 months ago
Indexing multi-dimensional data in a cloud system
Providing scalable database services is an essential requirement for extending many existing applications of the Cloud platform. Due to the diversity of applications, database ser...
Jinbao Wang, Sai Wu, Hong Gao, Jianzhong Li, Beng ...