Sciweavers

15840 search results - page 3125 / 3168
» The Control of Synchronous Systems
Sort
View
165
Voted
CODES
2004
IEEE
15 years 7 months ago
Power analysis of system-level on-chip communication architectures
For complex System-on-chips (SoCs) fabricated in nanometer technologies, the system-level on-chip communication architecture is emerging as a significant source of power consumpti...
Kanishka Lahiri, Anand Raghunathan
ATC
2006
Springer
15 years 7 months ago
Ubisafe Computing: Vision and Challenges (I)
In recent years, a variety of new computing paradigms have been proposed for various purposes. It is true that many of them intend to and really can gratify some of the people some...
Jianhua Ma, Qiangfu Zhao, Vipin Chaudhary, Jingde ...
144
Voted
AUSAI
2006
Springer
15 years 7 months ago
Robust Character Recognition Using a Hierarchical Bayesian Network
There is increasing evidence to suggest that the neocortex of the mammalian brain does not consist of a collection of specialised and dedicated cortical architectures, but instead ...
John Thornton, Torbjorn Gustafsson, Michael Blumen...
CCS
2006
ACM
15 years 7 months ago
RoleMiner: mining roles using subset enumeration
Role engineering, the task of defining roles and associating permissions to them, is essential to realize the full benefits of the role-based access control paradigm. Essentially,...
Jaideep Vaidya, Vijayalakshmi Atluri, Janice Warne...
144
Voted
CCS
2006
ACM
15 years 7 months ago
Measuring denial Of service
Denial-of-service (DoS) attacks significantly degrade service quality experienced by legitimate users by introducing long delays, excessive losses, and service interruptions. The ...
Jelena Mirkovic, Peter L. Reiher, Sonia Fahmy, Ros...
« Prev « First page 3125 / 3168 Last » Next »