Sciweavers

3724 search results - page 603 / 745
» Timed regular expressions
Sort
View
ISCAS
2008
IEEE
112views Hardware» more  ISCAS 2008»
15 years 4 months ago
Glitch-aware output switching activity from word-level statistics
— This paper presents models for estimating the transition activity of signals at the output of adders in Field Programmable Gate Arrays (FPGAs), given only word-level measures o...
Jonathan A. Clarke, George A. Constantinides, Pete...
86
Voted
PIMRC
2008
IEEE
15 years 4 months ago
Comparative performance evaluation of MAC protocols in ad hoc networks with bandwidth partitioning
—This paper considers the performance of the MAC protocols ALOHA and CSMA in wireless ad hoc networks, where the total system bandwidth may be divided into smaller subbands. In t...
Mariam Kaynia, Geir E. Øien, Nihar Jindal, ...
SECURWARE
2008
IEEE
15 years 4 months ago
Polynomial Heuristic Algorithms for Inconsistency Characterization in Firewall Rule Sets
Firewalls provide the first line of defence of nearly all networked institutions today. However, Firewall ACLs could have inconsistencies, allowing traffic that should be denied o...
Sergio Pozo Hidalgo, Rafael Ceballos, Rafael M. Ga...
WCNC
2008
IEEE
15 years 4 months ago
An Analytical Performance Model of Opportunistic Spectrum Access in a Military Environment
— In an opportunistic spectrum sharing system, secondary users equipped with cognitive radios opportunistically access spectrum that is not being used by the primary users, i.e.,...
Shensheng Tang, Brian L. Mark
WCRE
2008
IEEE
15 years 4 months ago
Consistent Layout for Thematic Software Maps
Software visualizations can provide a concise overview of a complex software system. Unfortunately, since software has no physical shape, there is no “natural” mapping of soft...
Adrian Kuhn, Peter Loretan, Oscar Nierstrasz