Sciweavers

2935 search results - page 528 / 587
» An Integrated Approach to High Integrity Software Verificati...
Sort
View
CANDT
2009
15 years 8 months ago
The conference room as a toolbox: technological and social routines in corporate meeting spaces
HCI, CSCW, and ubicomp researchers have developed new technologies and interaction techniques to support collaboration, ranging from electronic whiteboards to software supporting ...
Christopher Plaue, John T. Stasko, Mark Baloga
BPSC
2007
171views Business» more  BPSC 2007»
15 years 5 months ago
XML Databases: Principles and Usage
Originally XML was used as a standard protocol for data exchange in computing. The evolution of information technology has opened up new situations in which XML can be used to aut...
Jaroslav Pokorný
TCAD
2010
160views more  TCAD 2010»
14 years 11 months ago
SunFloor 3D: A Tool for Networks on Chip Topology Synthesis for 3-D Systems on Chips
Three-dimensional integrated circuits (3D-ICs) are a promising approach to address the integration challenges faced by current systems on chips (SoCs). Designing an efficient netwo...
Ciprian Seiculescu, Srinivasan Murali, Luca Benini...
FCCM
1999
IEEE
210views VLSI» more  FCCM 1999»
15 years 8 months ago
Algorithm Analysis and Mapping Environment for Adaptive Computing Systems: Further Results
Abstract We are developing an integrated algorithm analysis and mapping environment particularly tailored for signal processing applications on Adaptive Computing Systems ACS. Our ...
Eric K. Pauer, Paul D. Fiore, John M. Smith
CSFW
2011
IEEE
14 years 4 months ago
Local Memory via Layout Randomization
—Randomization is used in computer security as a tool to introduce unpredictability into the software infrastructure. In this paper, we study the use of randomization to achieve ...
Radha Jagadeesan, Corin Pitcher, Julian Rathke, Ja...