Sciweavers

1134 search results - page 115 / 227
» Optimizing Designs based on Risk Approach
Sort
View
SAC
2008
ACM
14 years 9 months ago
A cost-driven approach to role engineering
In recent years role-based access control (RBAC) has been spreading within organizations. However, companies still have considerable difficulty migrating to this model, due to the...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...
DATE
2009
IEEE
119views Hardware» more  DATE 2009»
15 years 1 months ago
Predictive models for multimedia applications power consumption based on use-case and OS level analysis
—Power management at any abstraction level is a key issue for many mobile multimedia and embedded applications. In this paper a design workflow to generate system-level power mo...
Patrick Bellasi, William Fornaciari, David Siorpae...
ICCD
2001
IEEE
176views Hardware» more  ICCD 2001»
15 years 7 months ago
BDD Variable Ordering by Scatter Search
Reduced Ordered Binary Decision Diagrams (BDDs) are a data structure for representation and manipulation of Boolean functions which are frequently used in VLSI Design Automation. ...
William N. N. Hung, Xiaoyu Song
NOMS
2010
IEEE
173views Communications» more  NOMS 2010»
14 years 8 months ago
Dynamic resource allocation and power management in virtualized data centers
—We investigate optimal resource allocation and power management in virtualized data centers with time-varying workloads and heterogeneous applications. Prior work in this area u...
Rahul Urgaonkar, Ulas C. Kozat, Ken Igarashi, Mich...
FDL
2005
IEEE
15 years 3 months ago
Automatic synthesis of the Hardware/Software Interface
Although Moore’s Law enables a huge number of components to be integrated into a single chip, design methods that will allow system architects to put the components together to ...
Francesco Regazzoni, André C. Nácul,...