Sciweavers

2500 search results - page 59 / 500
» Specifying Behavior in C
Sort
View
HICSS
2007
IEEE
145views Biometrics» more  HICSS 2007»
14 years 3 months ago
Next-Generation Software Engineering: Function Extraction for Computation of Software Behavior
The ultra-large-scale systems of the future require the transformation of software engineering into a computational discipline capable of fast and dependable software development....
Richard C. Linger, Mark G. Pleszkoch, Luanne Burns...
DAC
1999
ACM
14 years 1 months ago
Hardware Reuse at the Behavioral Level
Standard interfaces for hardware reuse are currently de ned at the structural level. In contrast to this, our contribution de nes the reuse interface at the behavioral registertra...
Patrick Schaumont, Radim Cmar, Serge Vernalde, Mar...
SPATIALCOGNITION
1998
Springer
14 years 1 months ago
Behavioral Experiments in Spatial Cognition Using Virtual Reality
Abstract. Virtual reality is used as a novel tool for behavioral experiments on humans. Two environments, Hexatown and Virtual Tubingen, are presented. Experiments on cognitive map...
Hanspeter A. Mallot, Sabine Gillner, Hendrik A. H....
MIDDLEWARE
2007
Springer
14 years 3 months ago
Securing peer-to-peer media streaming systems from selfish and malicious behavior
We present a flexible framework for throttling attackers in peerto-peer media streaming systems. In such systems, selfish nodes (e.g., free riders) and malicious nodes (e.g., DoS ...
William Conner, Klara Nahrstedt
PDCAT
2007
Springer
14 years 3 months ago
Privacy Preserving Set Intersection Protocol Secure against Malicious Behaviors
When datasets are distributed on different sources, finding out their intersection while preserving the privacy of the datasets is a widely required task. In this paper, we addre...
Yingpeng Sang, Hong Shen