Sciweavers

988 search results - page 190 / 198
» Positive Results and Techniques for Obfuscation
Sort
View
HVC
2005
Springer
183views Hardware» more  HVC 2005»
14 years 2 months ago
Detecting Potential Deadlocks with Static Analysis and Run-Time Monitoring
Concurrent programs are notorious for containing errors that are difficult to reproduce and diagnose. A common kind of concurrency error is deadlock, which occurs when a set of thr...
Rahul Agarwal, Liqiang Wang, Scott D. Stoller
TACAS
2005
Springer
108views Algorithms» more  TACAS 2005»
14 years 2 months ago
On Some Transformation Invariants Under Retiming and Resynthesis
Transformations using retiming and resynthesis operations are the most important and practical (if not the only) techniques used in optimizing synchronous hardware systems. Althoug...
Jie-Hong Roland Jiang
ISPD
2004
ACM
134views Hardware» more  ISPD 2004»
14 years 2 months ago
Performance-driven register insertion in placement
As the CMOS technology is scaled into the dimension of nanometer, the clock frequencies and die sizes of ICs are shown to be increasing steadily [5]. Today, global wires that requ...
Dennis K. Y. Tong, Evangeline F. Y. Young
AP2PC
2004
Springer
14 years 2 months ago
ACP2P: Agent Community Based Peer-to-Peer Information Retrieval
This paper proposes an agent community based information retrieval method, which uses agent communities to manage and look up information related to users. An agent works as a dele...
Tsunenori Mine, Daisuke Matsuno, Akihiro Kogo, Mak...
ESORICS
2004
Springer
14 years 2 months ago
Discovering Novel Attack Strategies from INFOSEC Alerts
Abstract. Correlating security alerts and discovering attack strategies are important and challenging tasks for security analysts. Recently, there have been several proposed techni...
Xinzhou Qin, Wenke Lee