Sciweavers

2912 search results - page 528 / 583
» A Study of Collaboration in Software Design
Sort
View
143
Voted
ICCD
2005
IEEE
165views Hardware» more  ICCD 2005»
16 years 19 days ago
Applying Resource Sharing Algorithms to ADL-driven Automatic ASIP Implementation
Presently, Architecture Description Languages (ADLs) are widely used to raise the abstraction level of the design space exploration of Application Specific Instruction-set Proces...
Ernst Martin Witte, Anupam Chattopadhyay, Oliver S...
146
Voted
PADL
2010
Springer
16 years 18 days ago
Similar Code Detection and Elimination for Erlang Programs
A well-known bad code smell in refactoring and software maintenance is duplicated code, that is the existence of code clones, which are code fragments that are identical or similar...
Huiqing Li, Simon Thompson
126
Voted
WISEC
2010
ACM
15 years 10 months ago
Automating the injection of believable decoys to detect snooping
We propose a novel trap-based architecture for enterprise networks that detects “silent” attackers who are eavesdropping network traffic. The primary contributions of our work...
Brian M. Bowen, Vasileios P. Kemerlis, Pratap V. P...
140
Voted
PADS
2009
ACM
15 years 10 months ago
Real-Time Security Exercises on a Realistic Interdomain Routing Experiment Platform
We use a realistic interdomain routing experiment platform to conduct real-time attack and defense exercises for training purposes. Our interdomain routing experiment platform int...
Yue Li, Michael Liljenstam, Jason Liu
126
Voted
SAC
2009
ACM
15 years 10 months ago
A passive conformance testing approach for a MANET routing protocol
In this paper we propose a passive conformance testing technique applied to a Mobile ad hoc network (MANET) routing protocol, OLSR, that is characterized by a dynamically changing...
Ana R. Cavalli, Stéphane Maag, Edgardo Mont...