Sciweavers

4480 search results - page 97 / 896
» Prototyping Completion with Constraints Using Computational ...
Sort
View
TEC
2002
166views more  TEC 2002»
15 years 3 months ago
An artificial immune system architecture for computer security applications
With increased global interconnectivity, reliance on e-commerce, network services, and Internet communication, computer security has become a necessity. Organizations must protect ...
Paul K. Harmer, Paul D. Williams, Gregg H. Gunsch,...
90
Voted
ATS
1998
IEEE
114views Hardware» more  ATS 1998»
15 years 8 months ago
Design and Simulation of a RISC-Based 32-bit Embedded On-Board Computer
This paper presents the design and simulation method for developing a RISC-based 32-bit embedded on-board computer. Instead of the conventional breadboarded prototype, (1) we used...
Zhen Guo, He Li, Shuling Guo, Dongsheng Wang
120
Voted
JCP
2006
104views more  JCP 2006»
15 years 3 months ago
Symmetric Active/Active High Availability for High-Performance Computing System Services
Abstract-- This work aims to pave the way for high availability in high-performance computing (HPC) by focusing on efficient redundancy strategies for head and service nodes. These...
Christian Engelmann, Stephen L. Scott, Chokchai Le...
117
Voted
CJ
2004
77views more  CJ 2004»
15 years 3 months ago
Smart Messages: A Distributed Computing Platform for Networks of Embedded Systems
In this paper, we present the design and implementation of Smart Messages, a distributed computing platform for networks of embedded systems based on execution migration. A Smart ...
Porlin Kang, Cristian Borcea, Gang Xu, Akhilesh Sa...
HICSS
2000
IEEE
208views Biometrics» more  HICSS 2000»
15 years 8 months ago
Transfer Capability Computations in Deregulated Power Systems
With the recent trend towards deregulating power systems around the world, transfer capability computation emerges as the key issue to a smoothly running power market with multipl...
Mohamed Shaaban, Yixin Ni, Felix F. Wu