Sciweavers

3555 search results - page 242 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
HASE
2007
IEEE
15 years 11 months ago
Systems Architectures for Transactional Network Interface
Systems such as software transactional memory and some exception handling techniques use transactions. However, a typical limitation of such systems is that they do not allow syst...
Manish Marwah, Shivakant Mishra, Christof Fetzer
AUTOMATICA
2007
97views more  AUTOMATICA 2007»
15 years 5 months ago
State estimation for linear systems with state equality constraints
This paper deals with state estimation problem for linear systems with state equality constraints. Using noisy measurements which are available from the observable system, we cons...
Sangho Ko, Robert R. Bitmead
APCSAC
2001
IEEE
15 years 8 months ago
Password-Capabilities: Their Evolution from the Password-Capability System into Walnut and Beyond
Since we first devised and defined password-capabilities as a new technique for building capability-based operating systems, a number of research systems around the world have use...
Ronald Pose
MASS
2010
161views Communications» more  MASS 2010»
14 years 12 months ago
Mode switch - Adaptive use of delay-sensitive or energy-aware communication in IEEE 802.15.4-based networks
Abstract--We propose "mode switch", an adaptive loadsensitive solution that supports both an energy-efficient operation mode for transmitting normal sensor data and an Qo...
Feng Chen, Xiaoyu Tong, Edith Ngar, Falko Dressler
DSD
2009
IEEE
88views Hardware» more  DSD 2009»
15 years 2 months ago
A Synthesisable Quasi-Delay Insensitive Result Forwarding Unit for an Asynchronous Processor
Abstract--The implementation of an efficient result forwarding unit for asynchronous processors faces the problem of the inherent lack of synchronisation between result producer an...
Luis A. Tarazona, Doug A. Edwards, Luis A. Plana