Sciweavers

4820 search results - page 389 / 964
» Implementing Signatures for C
Sort
View
ICCAD
2007
IEEE
139views Hardware» more  ICCAD 2007»
15 years 11 months ago
Using functional independence conditions to optimize the performance of latency-insensitive systems
—In latency-insensitive design shell modules are used to encapsulate system components (pearls) in order to interface them with the given latency-insensitive protocol and dynamic...
Cheng-Hong Li, Luca P. Carloni
ICSEA
2007
IEEE
15 years 11 months ago
An Extensible Architecture for Network-Attached Device Management
The development of network-attached devices has ushered in an era of autonomous, multi-function equipment demanding minimal human interaction: the only requirements are data and e...
Michael J. McMahon Jr., Sergiu M. Dascalu, Frederi...
IROS
2007
IEEE
97views Robotics» more  IROS 2007»
15 years 11 months ago
Meld: A declarative approach to programming ensembles
Abstract— This paper presents Meld, a programming language for modular robots, i.e., for independently executing robots where inter-robot communication is limited to immediate ne...
Michael P. Ashley-Rollman, Seth Copen Goldstein, P...
VTC
2007
IEEE
15 years 11 months ago
Discrete Power Allocation for Lifetime Maximization in Cooperative Networks
Abstract— Discrete power allocation strategies for amplifyand-forward cooperative networks are proposed based on selective relaying methods. The goal of power allocation is to ma...
Wan-Jen Huang, Yao-Win Hong, C. C. Jay Kuo
CCS
2007
ACM
15 years 11 months ago
Optimal security hardening using multi-objective optimization on attack tree models of networks
Researchers have previously looked into the problem of determining if a given set of security hardening measures can effectively make a networked system secure. Many of them also...
Rinku Dewri, Nayot Poolsappasit, Indrajit Ray, Dar...