Sciweavers

1199 search results - page 42 / 240
» How to Compare the Power of Computational Models
Sort
View
ICDCSW
2005
IEEE
15 years 5 months ago
QoS Oriented Dynamic Replica Cost Model for P2P Computing
Replication on multiple nodes is an effective way to improve the availability in the P2P or grid environment. It is difficult to determine how many replicas can fulfill the user r...
Feng Mao, Hai Jin, Deqing Zou, Baoli Chen, Li Qi
DAC
2004
ACM
16 years 23 days ago
Worst-case circuit delay taking into account power supply variations
Current Static Timing Analysis (STA) techniques allow one to verify the timing of a circuit at different process corners which only consider cases where all the supplies are low o...
Dionysios Kouroussis, Rubil Ahmadi, Farid N. Najm
ICCAD
2003
IEEE
194views Hardware» more  ICCAD 2003»
15 years 8 months ago
On the Interaction Between Power-Aware FPGA CAD Algorithms
As Field-Programmable Gate Array (FPGA) power consumption continues to increase, lower power FPGA circuitry, architectures, and Computer-Aided Design (CAD) tools need to be develo...
Julien Lamoureux, Steven J. E. Wilton
ENTCS
2006
109views more  ENTCS 2006»
14 years 11 months ago
Roles as a Coordination Construct: Introducing powerJava
In this paper we apply the role metaphor to coordination. Roles are used in sociology as a way to structure organizations and to coordinate their behavior. In our model, the featu...
Matteo Baldoni, Guido Boella, Leendert W. N. van d...
AIM
2002
14 years 11 months ago
Computational Vulnerability Analysis for Information Survivability
The Infrastructure of modern society is controlled by software systems. These systems are vulnerable to attacks; several such attacks, launched by "recreation hackers" h...
Howard E. Shrobe