Sciweavers

7426 search results - page 1379 / 1486
» The LHC Computing Challenge
Sort
View
LCTRTS
2009
Springer
15 years 4 months ago
Push-assisted migration of real-time tasks in multi-core processors
Multicores are becoming ubiquitous, not only in general-purpose but also embedded computing. This trend is a reflexion of contemporary embedded applications posing steadily incre...
Abhik Sarkar, Frank Mueller, Harini Ramaprasad, Si...
CEC
2009
IEEE
15 years 4 months ago
What is situated evolution?
—In this paper we discuss the notion of situated evolution. Our treatment includes positioning situated evolution on the map of evolutionary processes in terms of time- and space...
Martijn C. Schut, Evert Haasdijk, A. E. Eiben
GLOBECOM
2009
IEEE
15 years 4 months ago
Peer-to-Peer Single Hop Distributed Hash Tables
Abstract—Efficiently locating information in large-scale distributed systems is a challenging problem to which Peer-to-Peer (P2P) Distributed Hash Tables (DHTs) can provide a hi...
Luiz Rodolpho Monnerat, Cláudio L. Amorim
QSHINE
2009
IEEE
15 years 4 months ago
Supporting VoIP Services in IEEE 802.11e WLANs
Voice over Internet Protocol (VoIP) over Wireless Local Area Network (WLAN) is becoming popular thanks to its cost efficiency. However, it has been a challenge to provide good qual...
Jeonggyun Yu, Munhwan Choi, Daji Qiao, Sunghyun Ch...
RECONFIG
2009
IEEE
172views VLSI» more  RECONFIG 2009»
15 years 4 months ago
Combined SCA and DFA Countermeasures Integrable in a FPGA Design Flow
Abstract—The main challenge when implementing cryptographic algorithms in hardware is to protect them against attacks that target directly the device. Two strategies are customar...
Shivam Bhasin, Jean-Luc Danger, Florent Flament, T...
« Prev « First page 1379 / 1486 Last » Next »