Sciweavers

8766 search results - page 1376 / 1754
» Functional logic programming
Sort
View
ADHOCNOW
2008
Springer
15 years 10 months ago
Distributed Monitoring in Ad Hoc Networks: Conformance and Security Checking
Ad hoc networks are exposed more than traditional networks to security threats due to their mobility and open architecture aspects. In addition, any dysfunction due to badly congu...
Wissam Mallouli, Bachar Wehbi, Ana R. Cavalli
ICCCN
2007
IEEE
15 years 10 months ago
Delay Analysis of Combined Input-Crosspoint Queueing Switches
Abstract— The switch architecture with the combined inputcrosspoint queueing (CICQ) scheme has been recognized as a practical promising solution for building cost-effective highp...
Ge Nong, Ning Situ, Mounir Hamdi
ICDIM
2007
IEEE
15 years 10 months ago
Control validation of D.E.S systems: Application to remote laboratories
Objectives of Automation courses are knowledge and know-how transfer to students. It is important for learner to control locally or remotely real systems composed of many sensors ...
Pascale Marange, François Gellot, Bernard R...
ICNSC
2007
IEEE
15 years 10 months ago
Adaptive Network Flow Clustering
— Flow level measurements are used to provide insights into the traffic flow crossing a network link. However, existing flow based network detection devices lack adaptive reconfi...
Sui Song, Zhixiong Chen
IOLTS
2007
IEEE
124views Hardware» more  IOLTS 2007»
15 years 10 months ago
On-Line Self-Healing of Circuits Implemented on Reconfigurable FPGAs
i To boost logic density and reduce per unit power consumption SRAM-based FPGAs manufacturers adopted nanometric technologies. However, this technology is highly vulnerable to radi...
Manuel G. Gericota, Luís F. Lemos, Gustavo ...
« Prev « First page 1376 / 1754 Last » Next »