Sciweavers

1321 search results - page 54 / 265
» Logic Simulation Using Networks of State Machines
Sort
View
ETRICS
2006
15 years 1 months ago
On the Use of Word Networks to Mimicry Attack Detection
Intrusion detection aims at raising an alarm any time the security of an IT system gets compromised. Though highly successful, Intrusion Detection Systems are all susceptible of mi...
Fernando Godínez, Dieter Hutter, Raul Monro...
ASPDAC
2005
ACM
130views Hardware» more  ASPDAC 2005»
14 years 11 months ago
Stability analysis of active clock deskewing systems using a control theoretic approach
— In this paper, a methodology for analyzing closed loop clock distribution and active deskewing networks is proposed. An active clock distribution and deskewing network is model...
Vinil Varghese, Tom Chen, Peter Young
SENSYS
2006
ACM
15 years 3 months ago
Protothreads: simplifying event-driven programming of memory-constrained embedded systems
Event-driven programming is a popular model for writing programs for tiny embedded systems and sensor network nodes. While event-driven programming can keep the memory overhead do...
Adam Dunkels, Oliver Schmidt, Thiemo Voigt, Muneeb...
CSB
2005
IEEE
163views Bioinformatics» more  CSB 2005»
15 years 3 months ago
A symbolic approach to the simulation of biochemical models: application to circadian rhythms
Symbolic rewriting systems are gaining interest as tools for simulating biochemical dynamics. Compared to traditional methods based on differential equations, the symbolic approac...
Federico Fontana, Luca Bianco, Vincenzo Manca
CORR
2008
Springer
148views Education» more  CORR 2008»
14 years 8 months ago
Efficiently Simulating Higher-Order Arithmetic by a First-Order Theory Modulo
In deduction modulo, a theory is not represented by a set of axioms but by a congruence on propositions modulo which the inference rules of standard deductive systems--such as for ...
Guillaume Burel