Sciweavers

529 search results - page 3 / 106
» C Essentials
Sort
View
CCS
2010
ACM
14 years 2 months ago
Secure provenance: the essential of bread and butter of data forensics in cloud computing
Secure provenance that records ownership and process history of data objects is vital to the success of data forensics in cloud computing, yet it is still a challenging issue toda...
Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin (...
MSE
2005
IEEE
148views Hardware» more  MSE 2005»
14 years 1 months ago
Teaching System-Level Design Using SpecC and SystemC
System-level design of embedded computer systems is essential to manage complexity and enhance designer productivity. Viewing designs at t abstraction levels allows developers to ...
Robert D. Walstrom, Joseph Schneider, Diane T. Rov...

Book
301views
15 years 4 months ago
C Programming Tutorial
"This book is a tutorial. Its aim is to teach C to a beginner, but with enough of the details so as not be outgrown as the years go by. It presumes that you have some previo...
Mark Burgess
ICCD
2005
IEEE
124views Hardware» more  ICCD 2005»
14 years 1 months ago
Model Checking C Programs Using F-SOFT
— With the success of formal verification techniques like equivalence checking and model checking for hardware designs, there has been growing interest in applying such techniqu...
Franjo Ivancic, Ilya Shlyakhter, Aarti Gupta, Mala...
ISCAS
2005
IEEE
173views Hardware» more  ISCAS 2005»
14 years 1 months ago
Slack-time aware routing in NoC systems
—Efficient routing schemes are essential if Network on Chip (NoC) architectures are to be used for implementing multi-core systems for real-time multi-media applications. These s...
Daniel Andreasson, Shashi Kumar