Abstract. Positioned at the confluence between human/machine and hardware/software integration and backed by a solid proof of concept realized through several scenarios encompassin...
In this paper, we present an algorithm for circuit partitioning with complex resource constraints in large FPGAs. Traditional partitioning methods estimate the capacity of an FPGA...
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...
Many collaborative music recommender systems (CMRS) have succeeded in capturing the similarity among users or items based on ratings, however they have rarely considered about the...
Qing Li, Byeong Man Kim, Donghai Guan, Duk whan Oh
Software frequently needs to adapt its behavior at run time to respond to changes in its execution environment. Different software components may use different approaches to adap...
Zhenxiao Yang, Zhinan Zhou, Betty H. C. Cheng, Phi...