Sciweavers

1673 search results - page 320 / 335
» Software Components, Architectures and Reuse
Sort
View
DATE
2010
IEEE
147views Hardware» more  DATE 2010»
15 years 8 days ago
Detecting/preventing information leakage on the memory bus due to malicious hardware
An increasing concern amongst designers and integrators of military and defense-related systems is the underlying security of the individual microprocessor components that make up ...
Abhishek Das, Gokhan Memik, Joseph Zambreno, Alok ...
CPAIOR
2008
Springer
14 years 11 months ago
Optimal Deployment of Eventually-Serializable Data Services
Abstract. Replication is a fundamental technique for increasing throughput and achieving fault tolerance in distributed data services. However, its implementation may induce signif...
Laurent Michel, Alexander A. Shvartsman, Elaine L....
ETS
2007
IEEE
128views Hardware» more  ETS 2007»
14 years 11 months ago
Selecting Power-Optimal SBST Routines for On-Line Processor Testing
Software-Based Self-Test (SBST) has emerged as an effective strategy for on-line testing of processors integrated in non-safety critical embedded system applications. Among the mo...
Andreas Merentitis, Nektarios Kranitis, Antonis M....
IJCAI
2007
14 years 11 months ago
A Multi-Agent Medical System for Indian Rural Infant and Child Care
In this paper, a Multi-agent System (MAS) is presented for providing clinical decision support to healthcare practitioners in rural or remote areas of India for young infants or c...
Vijay Kumar Mago, M. Syamala Devi
NETWORKING
2008
14 years 11 months ago
XIAN Automated Management and Nano-Protocol to Design Cross-Layer Metrics for Ad Hoc Networking
In the highly dynamic and unpredictable environment of MANETs, cross-layer design is receiving growing interest but lacks experimental validation tools. This paper presents XIAN (C...
Hervé Aïache, Vania Conan, Laure Lebru...