Sciweavers

3516 search results - page 611 / 704
» Integrating Security Modeling into Embedded System Design
Sort
View
150
Voted
ISLPED
2010
ACM
153views Hardware» more  ISLPED 2010»
15 years 3 months ago
Leakage minimization using self sensing and thermal management
We have developed a system architecture, measuring and modeling techniques, and algorithms for on-line power and energy optimization and thermal management. The starting point for...
Alireza Vahdatpour, Miodrag Potkonjak
140
Voted
ICSE
2008
IEEE-ACM
16 years 3 months ago
CCVisu: automatic visual software decomposition
Understanding the structure of large existing (and evolving) software systems is a major challenge for software engineers. In reverse engineering, we aim to compute, for a given s...
Dirk Beyer
105
Voted
FAST
2008
15 years 6 months ago
Parity Lost and Parity Regained
RAID storage systems protect data from storage errors, such as data corruption, using a set of one or more integrity techniques, such as checksums. The exact protection offered by...
Andrew Krioukov, Lakshmi N. Bairavasundaram, Garth...
120
Voted
GLOBECOM
2008
IEEE
15 years 10 months ago
TwoHop: Metric-Based Trust Evaluation for Peer-to-Peer Collaboration Environments
—Communications are increasingly relying on peer– to–peer models of interaction in which all participating entities have the same level of authority. Such models allow develo...
Dimitris Glynos, Patroklos G. Argyroudis, Christos...
IJCAT
2008
72views more  IJCAT 2008»
15 years 3 months ago
Capacity analysis of container terminals using simulation techniques
Modeling and simulation are essential tools for the design and analysis of container terminals. A computer model can emulate the activities at various levels of details and captur...
Shell-Ying Huang, Wen-Jing Hsu, Chuanyu Chen, Rong...