Sciweavers

1134 search results - page 30 / 227
» Optimizing Designs based on Risk Approach
Sort
View
ITCC
2005
IEEE
15 years 3 months ago
Design Theoretic Approach to Replicated Declustering
Declustering techniques reduce query response times through parallel I/O by distributing data among multiple devices. Most of the research on declustering is targeted at spatial r...
Ali Saman Tosun
ADHOCNOW
2006
Springer
15 years 3 months ago
Circularity-Based Medium Access Control in Mobile Ad Hoc Networks
Abstract. The RTS/CTS access scheme, designed to reduce the number of collisions in a IEEE 802.11 network, is known to exhibit problems due to masked nodes, the imbalance between t...
Mohammad Z. Ahmad, Damla Turgut, R. Bhakthavathsal...
ICCD
1994
IEEE
142views Hardware» more  ICCD 1994»
15 years 1 months ago
Grammar-Based Optimization of Synthesis Scenarios
Systems for multi-level logic optimization are usually based on a set of specialized, loosely-related transformations which work on a network representation. The sequence of trans...
Andreas Kuehlmann, Lukas P. P. P. van Ginneken
CHES
2009
Springer
150views Cryptology» more  CHES 2009»
15 years 4 months ago
A Design Flow and Evaluation Framework for DPA-Resistant Instruction Set Extensions
Power-based side channel attacks are a significant security risk, especially for embedded applications. To improve the security of such devices, protected logic styles have been p...
Francesco Regazzoni, Alessandro Cevrero, Fran&cced...
ECR
2002
95views more  ECR 2002»
14 years 9 months ago
Motivating Human-Agent Interaction: Transferring Insights from Behavioral Marketing to Interface Design
The understanding of consumer interaction with online EC Websites is one of the big current challenges for online marketers. The present paper investigates what drives and impedes...
Sarah Spiekermann, Corina Paraschiv