Sciweavers

1850 search results - page 366 / 370
» Design-for-debugging of application specific designs
Sort
View
FAC
2006
122views more  FAC 2006»
13 years 7 months ago
The verified software repository: a step towards the verifying compiler
The Verified Software Repository is dedicated to a long-term vision of a future in which all computer systems justify the trust that Society increasingly places in them. This will ...
Juan Bicarregui, C. A. R. Hoare, J. C. P. Woodcock
CN
2007
146views more  CN 2007»
13 years 7 months ago
Autonomic control and personalization of a wireless access network
As ICT services are becoming more ubiquitous and mobile and access technologies grow to be more heterogeneous and complex, we are witnessing the increasing importance of two relat...
Nicola Blefari-Melazzi, Dario Di Sorte, Mauro Femm...
JUCS
2008
113views more  JUCS 2008»
13 years 7 months ago
What is Correctness of Security Protocols?
: As soon as major protocol flaws were discovered empirically -- a good luck that is not older than the early 1990s -- this title question came up to the world. It was soon realise...
Giampaolo Bella
JMIV
2006
91views more  JMIV 2006»
13 years 7 months ago
Harmonic Embeddings for Linear Shape Analysis
We present a novel representation of shape for closed contours in R2 or for compact surfaces in R3 explicitly designed to possess a linear structure. This greatly simplifies linear...
Alessandro Duci, Anthony J. Yezzi, Stefano Soatto,...
SIGMETRICS
2008
ACM
117views Hardware» more  SIGMETRICS 2008»
13 years 7 months ago
Epidemic live streaming: optimal performance trade-offs
Several peer-to-peer systems for live streaming have been recently deployed (e.g. CoolStreaming, PPLive, SopCast). These all rely on distributed, epidemic-style dissemination mech...
Thomas Bonald, Laurent Massoulié, Fabien Ma...