Sciweavers

621 search results - page 79 / 125
» Identifying the (Tele)Presence Literature
Sort
View
ICCAD
1999
IEEE
108views Hardware» more  ICCAD 1999»
14 years 2 months ago
Copy detection for intellectual property protection of VLSI designs
We give the first study of copy detection techniques for VLSI CAD applications; these techniques are complementary to previous watermarking-based IP protection methods in finding ...
Andrew B. Kahng, Darko Kirovski, Stefanus Mantik, ...
IWAN
1999
Springer
14 years 1 months ago
Interference and Communications among Active Network Applications
This paper focuses on active networks applications and in particular on the possible interactions among these applications. Active networking is a very promising research field wh...
Luca Delgrossi, Giuseppe Di Fatta, Domenico Ferrar...
ISCA
1998
IEEE
144views Hardware» more  ISCA 1998»
14 years 1 months ago
Declustered Disk Array Architectures with Optimal and Near-Optimal Parallelism
This paper investigates the placement of data and parity on redundant disk arrays. Declustered organizations have been traditionally used to achieve fast reconstruction of a faile...
Guillermo A. Alvarez, Walter A. Burkhard, Larry J....
ISSTA
1998
ACM
14 years 1 months ago
Computation of Interprocedural Control Dependence
Program dependence information is useful for a variety of software testing and maintenance tasks. Properly defined, control and data dependencies can be used to identify semantic...
Mary Jean Harrold, Gregg Rothermel, Saurabh Sinha
CP
1998
Springer
14 years 1 months ago
Random Constraint Satisfaction: Theory Meets Practice
Abstract. We study the experimental consequences of a recent theoretical result by Achlioptas et al. that shows that conventional models of random problems are trivially insoluble ...
Ewan MacIntyre, Patrick Prosser, Barbara M. Smith,...