Sciweavers

632 search results - page 79 / 127
» Performance Engineering for Industrial Embedded Data-Process...
Sort
View
AINA
2006
IEEE
15 years 6 months ago
Efficient Packet Matching for Gigabit Network Intrusion Detection using TCAMs
Ternary content-addressable memories (TCAMs) have gained wide acceptance in the industry for storing and searching patterns in routers. But two important problems block the way to...
Ming Gao, Kenong Zhang, Jiahua Lu
98
Voted
EAAI
2007
135views more  EAAI 2007»
15 years 15 days ago
Automatic generation of explanations: AGE
Explaining how engineering devices work is important to students, engineers, and operators. In general, machine generated explanations have been produced from a particular perspec...
Silvia B. González-Brambila, Eduardo F. Mor...
125
Voted
IAJIT
2011
14 years 4 months ago
An RFID-based validation system for halal food
: In recent years, Muslims have depended on the Halal logo, displayed on food packaging, to indicate that the products are prepared according to Halal precepts. As laid out in the ...
Mohd Nasir, Azah Norman, Shukor Fauzi, Masliyana A...
103
Voted
ICSE
2008
IEEE-ACM
16 years 19 days ago
Continuous software quality supervision using SourceInventory and Columbus
Several tools and methods for source code quality assurance based on static analysis finally reached a state when they are applicable in practice and recognized by the industry. H...
Árpád Beszédes, Rudolf Ferenc...
93
Voted
ICCD
2007
IEEE
140views Hardware» more  ICCD 2007»
15 years 9 months ago
A low overhead hardware technique for software integrity and confidentiality
Software integrity and confidentiality play a central role in making embedded computer systems resilient to various malicious actions, such as software attacks; probing and tamper...
Austin Rogers, Milena Milenkovic, Aleksandar Milen...