Sciweavers

528 search results - page 56 / 106
» Thermal Management in Embedded Systems Using MEMS
Sort
View
DRMTICS
2005
Springer
15 years 3 months ago
A Vector Approach to Cryptography Implementation
The current deployment of Digital Right Management (DRM) schemes to distribute protected contents and rights is leading the way to massive use of sophisticated embedded cryptograph...
Jacques J. A. Fournier, Simon W. Moore
EMSOFT
2005
Springer
15 years 3 months ago
Centralized end-to-end flow control in a best-effort network-on-chip
Run-time communication management in a Network-on-Chip (NoC) is a challenging task. On one hand, the NoC needs to satisfy the communication requirements (e.g. throughput) of runni...
Prabhat Avasare, Vincent Nollet, Jean-Yves Mignole...
CASES
2004
ACM
15 years 1 months ago
Reducing energy consumption of queries in memory-resident database systems
The tremendous growth of system memories has increased the capacities and capabilities of memory-resident embedded databases, yet current embedded databases need to be tuned in or...
Jayaprakash Pisharath, Alok N. Choudhary, Mahmut T...
ISVLSI
2003
IEEE
147views VLSI» more  ISVLSI 2003»
15 years 3 months ago
Automated Dynamic Memory Data Type Implementation Exploration and Optimization
The behavior of many algorithms is heavily determined by the input data. Furthermore, this often means that multiple and completely different execution paths can be followed, also...
Marc Leeman, Chantal Ykman-Couvreur, David Atienza...
CIMCA
2006
IEEE
15 years 3 months ago
A Knowledge-based Security Policy Framework for Business Process Management
Business Process Management (BPM) is often a key component of the business change. Business rules, whether embedded within BPM or on their own, have begun playing an ever-increasi...
Dong Huang, Yi Yang, Jacques Calmet