Sciweavers

1682 search results - page 103 / 337
» Techniques for Automating Distributed Real-Time Applications...
Sort
View
104
Voted
ICDE
2006
IEEE
131views Database» more  ICDE 2006»
15 years 9 months ago
A Peer-to-Peer Architecture to Enable Versatile Lookup System Design
The resource lookup requirements in applications such as web caching, web content search, content distribution, resource sharing, network monitoring and management, and e-commerce...
Vivek Sawant, Jasleen Kaur
IDEAS
2008
IEEE
256views Database» more  IDEAS 2008»
15 years 9 months ago
WIDS: a sensor-based online mining wireless intrusion detection system
This paper proposes WIDS, a wireless intrusion detection system, which applies data mining clustering technique to wireless network data captured through hardware sensors for purp...
Christie I. Ezeife, Maxwell Ejelike, Akshai K. Agg...
VLSID
2008
IEEE
128views VLSI» more  VLSID 2008»
16 years 3 months ago
A Novel Approach to Compute Spatial Reuse in the Design of Custom Instructions
In the automatic design of custom instruction set processors, there can be a very large set of potential custom instructions, from which a few instructions are required to be chos...
Nagaraju Pothineni, Anshul Kumar, Kolin Paul
AOSE
2006
Springer
15 years 7 months ago
Applying the Governance Framework Technique to Promote Maintainability in Open Multi-Agent Systems
Abstract. Governance means that specifications are enforced dynamically at application runtime. Governance framework is a technique to design and implement an extensible interactio...
Gustavo R. de Carvalho, Carlos José Pereira...
ASPDAC
2006
ACM
131views Hardware» more  ASPDAC 2006»
15 years 9 months ago
POSIX modeling in SystemC
- Early estimation of the execution time of Real-Time embedded SW is an essential task in complex, HW/SW embedded system design. Application SW execution time estimation requires t...
Hector Posadas, Jesús Ádamez, Pablo ...