Sciweavers

669 search results - page 26 / 134
» Mastering the Master Theorem
Sort
View
ESEM
2007
ACM
13 years 11 months ago
"Talking tests": a Preliminary Experimental Study on Fit User Acceptance Tests
This short paper reports a pilot experiment conducted with master students, in which we investigated whether Fit test cases were helpful to clarify change requirements in a mainte...
Marco Torchiano, Filippo Ricca, Massimiliano Di Pe...
CCS
2001
ACM
13 years 12 months ago
A Cryptanalysis of the High-Bandwidth Digital Content Protection System
Abstract. We describe a weakness in the High Bandwidth Digital Content Protection (HDCP) scheme which may lead to practical attacks. HDCP is a proposed identity-based cryptosystem ...
Scott Crosby, Ian Goldberg, Robert Johnson, Dawn X...
ISPAN
1999
IEEE
13 years 11 months ago
Complete Exchange Algorithms in Wormhole-Routed Torus Networks: A Divide-and-Conquer Strategy
We present efficient all-to-all personalized communication algorithms for a 2D torus in wormhole-routed networks. Our complete exchange algorithm adopts divide-and-conquer approac...
Si-Gwan Kim, Seung Ryoul Maeng, Jung Wan Cho
ASPDAC
2007
ACM
103views Hardware» more  ASPDAC 2007»
13 years 11 months ago
Slack-based Bus Arbitration Scheme for Soft Real-time Constrained Embedded Systems
- We present a bus arbitration scheme for soft real-time constrained embedded systems. Some masters in such systems are required to complete their work for given timing constraints...
Minje Jun, Kwanhu Bang, Hyuk-Jun Lee, Naehyuck Cha...
SRDS
2006
IEEE
14 years 1 months ago
Reliably Executing Tasks in the Presence of Untrusted Entities
In this work we consider a distributed system formed by a master processor and a collection of n processors (workers) that can execute tasks; worker processors are untrusted and m...
Antonio Fernández, Luis López, Agust...