Sciweavers

4081 search results - page 690 / 817
» The Impact of Constraint Programming
Sort
View
INFOCOM
2006
IEEE
15 years 10 months ago
LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks
Abstract— Providing end-to-end data security, i.e., data confidentiality, authenticity, and availability, in wireless sensor networks (WSNs) is a non-trivial task. In addition t...
Kui Ren, Wenjing Lou, Yanchao Zhang
MICRO
2006
IEEE
144views Hardware» more  MICRO 2006»
15 years 10 months ago
Die Stacking (3D) Microarchitecture
3D die stacking is an exciting new technology that increases transistor density by vertically integrating two or more die with a dense, high-speed interface. The result of 3D die ...
Bryan Black, Murali Annavaram, Ned Brekelbaum, Joh...
SEW
2006
IEEE
15 years 10 months ago
Goal-Driven Software Development
Established software development processes focus on delivering software within time and budget according to a set of requirements. However, practical experiences show that neither...
Ingo Schnabel, Markus Pizka
ISLPED
2005
ACM
90views Hardware» more  ISLPED 2005»
15 years 10 months ago
Power and thermal effects of SRAM vs. Latch-Mux design styles and clock gating choices
This paper studies the impact on energy efficiency and thermal behavior of design style and clock-gating style in queue and array structures. These structures are major sources of...
Yingmin Li, Mark Hempstead, Patrick Mauro, David B...
VIZSEC
2005
Springer
15 years 9 months ago
Multiple Coordinated Views for Network Attack Graphs
While efficient graph-based representations have been developed for modeling combinations of low-level network attacks, relatively little attention has been paid to effective tech...
Steven Noel, Michael Jacobs, Pramod Kalapa, Sushil...