Sciweavers

3053 search results - page 503 / 611
» Performance of Generative Programming Based Protocol Impleme...
Sort
View
COR
2010
123views more  COR 2010»
15 years 2 months ago
Decomposition, reformulation, and diving in university course timetabling
In many real-life optimisation problems, there are multiple interacting components in a solution. For example, different components might specify assignments to different kinds of...
Edmund K. Burke, Jakub Marecek, Andrew J. Parkes, ...
TWC
2011
232views more  TWC 2011»
14 years 9 months ago
Joint Detection of Primary Systems Using UWB Impulse Radios
Abstract—Regulation in Europe and Japan requires the implementation of detect-and-avoid (DAA) techniques in some bands for the coexistence of licensed primary systems and seconda...
Serhat Erküçük, Lutz H.-J. Lampe,...
DAC
2005
ACM
16 years 3 months ago
Improving java virtual machine reliability for memory-constrained embedded systems
Dual-execution/checkpointing based transient error tolerance techniques have been widely used in the high-end mission critical systems. These techniques, however, are not very att...
Guangyu Chen, Mahmut T. Kandemir
111
Voted
HPCA
2006
IEEE
16 years 2 months ago
A decoupled KILO-instruction processor
Building processors with large instruction windows has been proposed as a mechanism for overcoming the memory wall, but finding a feasible and implementable design has been an elu...
Miquel Pericàs, Adrián Cristal, Rube...
151
Voted
ICST
2009
IEEE
15 years 9 months ago
Transforming and Selecting Functional Test Cases for Security Policy Testing
In this paper, we consider typical applications in which the business logic is separated from the access control logic, implemented in an independent component, called the Policy ...
Tejeddine Mouelhi, Yves Le Traon, Benoit Baudry