Sciweavers

2663 search results - page 181 / 533
» The Design, Implementation, and Evaluation of Jade
Sort
View
CODES
2005
IEEE
15 years 4 months ago
High-level synthesis for large bit-width multipliers on FPGAs: a case study
In this paper, we present the analysis, design and implementation of an estimator to realize large bit width unsigned integer multiplier units. Larger multiplier units are require...
Gang Quan, James P. Davis, Siddhaveerasharan Devar...
ER
2009
Springer
166views Database» more  ER 2009»
15 years 5 months ago
A Modeling Ontology for Integrating Vulnerabilities into Security Requirements Conceptual Foundations
Abstract. Vulnerabilities are weaknesses in the requirements, design, and implementation, which attackers exploit to compromise the system. This paper proposes a vulnerability-cent...
Golnaz Elahi, Eric S. K. Yu, Nicola Zannone
SPIN
2007
Springer
15 years 4 months ago
Scalable Multi-core LTL Model-Checking
Recent development in computer hardware has brought more wide-spread emergence of shared-memory, multi-core systems. These architectures offer opportunities to speed up various ta...
Jiri Barnat, Lubos Brim, Petr Rockai
GRID
2005
Springer
15 years 4 months ago
An autonomic service architecture for self-managing grid applications
—The scale, heterogeneity and dynamism of Grid applications and environments require Grid applications to be self-managing or autonomic. This paper presents the Accord autonomic ...
Hua Liu, Viraj Bhat, Manish Parashar, Scott Klasky
GI
2004
Springer
15 years 3 months ago
Static Safety Analysis of UML Action Semantics for Critical Systems Development
The Action Semantics for UML provides a standard and platform independent way to describe the behavior of methods and executable actions in object-oriented system design prior to i...
Zsigmond Pap, Dániel Varró