Sciweavers

12333 search results - page 2381 / 2467
» System Level Modelling for Hardware Software Systems
Sort
View
JCDL
2006
ACM
71views Education» more  JCDL 2006»
14 years 2 months ago
Using controlled query generation to evaluate blind relevance feedback algorithms
Currently in document retrieval there are many algorithms each with different strengths and weakness. There is some difficulty, however, in evaluating the impact of the test quer...
Chris Jordan, Carolyn R. Watters, Qigang Gao
PLDI
2006
ACM
14 years 2 months ago
Refactoring programs to secure information flows
Adding a sound information flow security policy to an existing program is a difficult task that requires major analysis of and changes to the program. In this paper we show how ...
Scott F. Smith, Mark Thober
WPES
2004
ACM
14 years 1 months ago
Soft blocking: flexible blocker tags on the cheap
A “blocker” tag is a form of privacy-enhancing radio-frequency identification (RFID) tag. It operates by interfering with the protocol in which a reader communicates individua...
Ari Juels, John G. Brainard
FPGA
1997
ACM
118views FPGA» more  FPGA 1997»
14 years 9 days ago
Module Generation of Complex Macros for Logic-Emulation Applications
Logic emulation is a technique that uses dynamically reprogrammable systems for prototyping and design veri cation. Using an emulator, designers can realize designs through a soft...
Wen-Jong Fang, Allen C.-H. Wu, Duan-Ping Chen
CSCW
2008
ACM
13 years 10 months ago
Providing awareness in multi-synchronous collaboration without compromising privacy
When involved in collaborative tasks, users often choose to use multi-synchronous applications in order to concurrently work in isolation. Hence, privacy of their changes is maint...
Claudia-Lavinia Ignat, Stavroula Papadopoulou, G&e...
« Prev « First page 2381 / 2467 Last » Next »