Sciweavers

1019 search results - page 196 / 204
» Computer Aided Ferret Design
Sort
View
PLDI
2006
ACM
14 years 20 days ago
Refactoring programs to secure information flows
Adding a sound information flow security policy to an existing program is a difficult task that requires major analysis of and changes to the program. In this paper we show how ...
Scott F. Smith, Mark Thober
ANCS
2005
ACM
14 years 8 days ago
Segmented hash: an efficient hash table implementation for high performance networking subsystems
Hash tables provide efficient table implementations, achieving O(1), query, insert and delete operations at low loads. However, at moderate or high loads collisions are quite freq...
Sailesh Kumar, Patrick Crowley
FPGA
2004
ACM
126views FPGA» more  FPGA 2004»
14 years 3 days ago
A synthesis oriented omniscient manual editor
The cost functions used to evaluate logic synthesis transformations for FPGAs are far removed from the final speed and routability determined after placement, routing and timing a...
Tomasz S. Czajkowski, Jonathan Rose
ICSOC
2004
Springer
14 years 2 days ago
Implementing integrated services of networked home appliances using service oriented architecture
This paper presents a method to implement integrated services of networked home electric appliances, which provide more convenient and comfortable living for home users. The conve...
Masahide Nakamura, Hiroshi Igaki, Haruaki Tamada, ...
IPSN
2010
Springer
13 years 11 months ago
Ear-phone: an end-to-end participatory urban noise mapping system
A noise map facilitates monitoring of environmental noise pollution in urban areas. It can raise citizen awareness of noise pollution levels, and aid in the development of mitigat...
Rajib Kumar Rana, Chun Tung Chou, Salil S. Kanhere...