Sciweavers

677 search results - page 120 / 136
» Domain-Retargetable Reverse Engineering
Sort
View
3DPVT
2006
IEEE
216views Visualization» more  3DPVT 2006»
14 years 1 months ago
Object Modeling with Guaranteed Fulfillment of Geometric Constraints
Object modeling under consideration of geometric constraints is an important task. In this paper we describe a novel approach to achieving this goal. It has the nice property that...
Da-Chuan Cheng, Xiaoyi Jiang
DAC
1995
ACM
14 years 1 months ago
Automatic Clock Abstraction from Sequential Circuits
Our goal is to transform a low-level circuit design into a more representation. A pre-existing tool, Tranalyze [4], takes a switch-level circuit and generates a functionally equiv...
Samir Jain, Randal E. Bryant, Alok Jain
USS
2008
14 years 2 days ago
Challenges and Directions for Monitoring P2P File Sharing Networks - or - Why My Printer Received a DMCA Takedown Notice
We reverse engineer copyright enforcement in the popular BitTorrent file sharing network and find that a common approach for identifying infringing users is not conclusive. We desc...
Michael Piatek, Tadayoshi Kohno, Arvind Krishnamur...
MBUI
2004
104views User Interface» more  MBUI 2004»
13 years 11 months ago
An EUD Approach for Making MBUI Practical
In this paper, we present our perspective on Model-Based User Interfaces (hereafter MBUI) paradigm and provide with our experience in this area combining high-level knowledge-base...
José A. Macías, Pablo Castells
NSDI
2004
13 years 11 months ago
Constructing Services with Interposable Virtual Hardware
Virtual machine monitors (VMMs) have enjoyed a resurgence in popularity, since VMMs can help to solve difficult systems problems like migration, fault tolerance, code sandboxing, ...
Andrew Whitaker, Richard S. Cox, Marianne Shaw, St...