Sciweavers

1729 search results - page 325 / 346
» Practical Temporal Projection
Sort
View
23
Voted
ICCAD
2004
IEEE
191views Hardware» more  ICCAD 2004»
14 years 4 months ago
Checking consistency of C and Verilog using predicate abstraction and induction
edicate Abstraction and Induction Edmund Clarke Daniel Kroening June 25, 2004 CMU-CS-04-131 School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213 It is common...
Daniel Kroening, Edmund M. Clarke
ACSAC
2009
IEEE
14 years 2 months ago
Detecting Software Theft via System Call Based Birthmarks
—Along with the burst of open source projects, software theft (or plagiarism) has become a very serious threat to the healthiness of software industry. Software birthmark, which ...
Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu
CCS
2009
ACM
14 years 2 months ago
Behavior based software theft detection
Along with the burst of open source projects, software theft (or plagiarism) has become a very serious threat to the healthiness of software industry. Software birthmark, which re...
Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu
EDBT
2009
ACM
218views Database» more  EDBT 2009»
14 years 2 months ago
Data integration flows for business intelligence
Business Intelligence (BI) refers to technologies, tools, and practices for collecting, integrating, analyzing, and presenting large volumes of information to enable better decisi...
Umeshwar Dayal, Malú Castellanos, Alkis Sim...
INFOCOM
2009
IEEE
14 years 2 months ago
LayerP2P: A New Data Scheduling Approach for Layered Streaming in Heterogeneous Networks
—Although layered streaming in heterogeneous peer-to-peer networks has drawn great interest in recent years, there’s still a lack of systematical studies on its data scheduling...
Xin Xiao, Yuanchun Shi, Yuan Gao, Qian Zhang