Sciweavers

127 search results - page 6 / 26
» Testing Security Properties of Protocol Implementations - a ...
Sort
View
ICC
2007
IEEE
169views Communications» more  ICC 2007»
14 years 2 months ago
Secure Vehicular Communications Based on Group Signature and ID-Based Signature Scheme
—Vehicular communication networking is a promising approach of facilitating road safety, traffic management, and infotainment dissemination for drivers and passengers. However, i...
Xiaoting Sun, Xiaodong Lin, Pin-Han Ho
ISPASS
2009
IEEE
14 years 3 months ago
Machine learning based online performance prediction for runtime parallelization and task scheduling
—With the emerging many-core paradigm, parallel programming must extend beyond its traditional realm of scientific applications. Converting existing sequential applications as w...
Jiangtian Li, Xiaosong Ma, Karan Singh, Martin Sch...
AHS
2006
IEEE
188views Hardware» more  AHS 2006»
14 years 11 days ago
Finite State Machine IP Watermarking: A Tutorial
Sharing Intellectual Property (IP) blocks in today's competitive market poses significant high security risks. In this paper, we present a tutorial for a watermarking approach...
Amr T. Abdel-Hamid, Sofiène Tahar, El Mosta...
ICALT
2005
IEEE
14 years 2 months ago
Designing Web-Based Interactive Learning Environments for Problem-Based Learning
Problem-based learning is a pedagogical strategy that centers learning activities around the investigation and development of solutions to complex and ill-structured authentic pro...
Lin Qiu, Christopher Riesbeck
ASPLOS
2012
ACM
12 years 4 months ago
Path-exploration lifting: hi-fi tests for lo-fi emulators
Processor emulators are widely used to provide isolation and instrumentation of binary software. However they have proved difficult to implement correctly: processor specificati...
Lorenzo Martignoni, Stephen McCamant, Pongsin Poos...