Sciweavers

3516 search results - page 557 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
DAC
2008
ACM
16 years 5 months ago
Automated transistor sizing for FPGA architecture exploration
The creation of an FPGA requires extensive transistor-level design. This is necessary for both the final design, and during architecture exploration, when many different logic and...
Ian Kuon, Jonathan Rose
IAT
2007
IEEE
15 years 10 months ago
Network Intrusion Detection by Means of Community of Trusting Agents
We apply advanced agent trust modeling techniques to identify malicious traffic in computer networks. Our work integrates four state-of-the-art techniques from anomaly detection,...
Martin Rehák, Michal Pechoucek, Karel Barto...
ISPD
2006
ACM
68views Hardware» more  ISPD 2006»
15 years 10 months ago
Solving hard instances of floorplacement
Physical Design of modern systems on chip is extremely challenging. Such digital integrated circuits often contain tens of millions of logic gates, intellectual property blocks, e...
Aaron N. Ng, Igor L. Markov, Rajat Aggarwal, Venky...
SSD
2001
Springer
162views Database» more  SSD 2001»
15 years 8 months ago
Interval Sequences: An Object-Relational Approach to Manage Spatial Data
The design of external index structures for one- and multidimensional extended objects is a long and well studied subject in basic database research. Today, more and more commercia...
Hans-Peter Kriegel, Marco Pötke, Thomas Seidl
PC
2007
112views Management» more  PC 2007»
15 years 3 months ago
Service address routing: a network-embedded resource management layer for cluster computing
Service address routing is introduced as a novel and powerful paradigm for the integration of resource management functions into the interconnection fabric of cluster computers. S...
Isaac D. Scherson, Daniel S. Valencia, Enrique Cau...