Sciweavers

621 search results - page 106 / 125
» Identifying the (Tele)Presence Literature
Sort
View
ICCAD
2002
IEEE
142views Hardware» more  ICCAD 2002»
14 years 4 months ago
SAT and ATPG: Boolean engines for formal hardware verification
In this survey, we outline basic SAT- and ATPGprocedures as well as their applications in formal hardware verification. We attempt to give the reader a trace trough literature and...
Armin Biere, Wolfgang Kunz
CCS
2009
ACM
14 years 2 months ago
English shellcode
History indicates that the security community commonly takes a divide-and-conquer approach to battling malware threats: identify the essential and inalienable components of an att...
Joshua Mason, Sam Small, Fabian Monrose, Greg MacM...
ICNP
2009
IEEE
14 years 2 months ago
Scalable IP Lookups using Shape Graphs
—Recently, there has been much renewed interest in developing compact data structures for packet processing functions such as longest prefix-match for IP lookups. This has been ...
Haoyu Song, Murali S. Kodialam, Fang Hao, T. V. La...
REFSQ
2009
Springer
14 years 2 months ago
A Controlled Experiment of a Method for Early Requirements Triage Utilizing Product Strategies
[Context and motivation] In market-driven product development of software intensive products large numbers of requirements threaten to overload the development organization. It is ...
Mahvish Khurum, Tony Gorschek, Lefteris Angelis, R...
ITICSE
2009
ACM
14 years 2 months ago
Relating research and teaching: learning from experiences and beliefs
The relationship between research and teaching has possible benefits and inherent tensions. Exploring the potentially beneficial relationship is of interest and possible value to ...
Su White, Alastair Irons