Sciweavers

360 search results - page 39 / 72
» Detecting Intrusions Specified in a Software Specification L...
Sort
View
FPL
2005
Springer
119views Hardware» more  FPL 2005»
14 years 1 months ago
Real-Time Feature Extraction for High Speed Networks
With the onset of Gigabit networks, current generation networking components will soon be insufficient for numerous reasons: most notably because existing methods cannot support h...
David Nguyen, Gokhan Memik, Seda Ogrenci Memik, Al...
IFIP
2000
Springer
13 years 11 months ago
Test Case Design for the Validation of Component-Based Embedded Systems
The validation of functional and real-time requirements of control software for embedded systems is a difficult task. It usually needs the electronic control unit (ECU) and the co...
W. Fleisch
DATE
1999
IEEE
120views Hardware» more  DATE 1999»
14 years 8 days ago
Hardware Synthesis from C/C++ Models
Software programming languages, such as C/C++, have been used as means for specifying hardware for quite a while. Different design methodologies have exploited the advantages of f...
Giovanni De Micheli
COLING
1990
13 years 9 months ago
A Logic-Based Government-Binding Parser for Mandarin Chinese
Mandarin Chinese is a highly flexible and context-sensitive language. It is difficult to do the case marking and index assignment during the parsing of Chinese sentences. This pap...
Hsin-Hsi Chen
POPL
2012
ACM
12 years 3 months ago
Access permission contracts for scripting languages
The ideal software contract fully specifies the behavior of an operation. Often, in particular in the context of scripting languages, a full specification may be cumbersome to s...
Phillip Heidegger, Annette Bieniusa, Peter Thieman...