Sciweavers

241 search results - page 38 / 49
» The Effectiveness of Flow Analysis for Inlining
Sort
View
RAID
1999
Springer
15 years 1 months ago
Towards trapping wily intruders in the large
The rapid increase in network bandwidth from mega bits per second to giga bits per second and potentially to tera bits per second, is making it increasingly difficult to carry out...
Glenn Mansfield
ESORICS
2008
Springer
14 years 11 months ago
Security Provisioning in Pervasive Environments Using Multi-objective Optimization
Pervasive computing applications involve information flow across multiple organizations. Thus, any security breach in an application can have far-reaching consequences. However, ef...
Rinku Dewri, Indrakshi Ray, Indrajit Ray, Darrell ...
CORR
2007
Springer
154views Education» more  CORR 2007»
14 years 9 months ago
Application of a design space exploration tool to enhance interleaver generation
This paper presents a methodology to efficiently explore the design space of communication adapters. In most digital signal processing (DSP) applications, the overall performance ...
Cyrille Chavet, Philippe Coussy, Pascal Urard, Eri...
JDCTA
2008
110views more  JDCTA 2008»
14 years 9 months ago
Development and Validation of a New Method for Noninvasive Diagnosis of LUTS
Lower urinary tract symptoms (LUTS) affect selfassessed quality of life. The aim of this study is to acquire useful information of LUTS diagnosis thorough uroflow and urophonograp...
Do-Un Jeong, Wan-Young Chung
RIDE
1999
IEEE
15 years 1 months ago
Specification of Cooperative Constraints in Virtual Enterprise Workflow
Workflow systems are an emerging technology which have become increasingly important in the drive for business to provide better services and increase productivity. Intuitively, w...
Anne H. H. Ngu