Sciweavers

1816 search results - page 24 / 364
» Trace oblivious computation
Sort
View
SIGITE
2005
ACM
14 years 3 months ago
Hands-on approach to teaching computer networking using packet traces
This paper describes a novel approach to teaching computer networking through packet traces of actual network traffic. The paper describes a set of exercises that use packet trace...
Jeanna Neefe Matthews
JCS
2010
112views more  JCS 2010»
13 years 8 months ago
Inductive trace properties for computational security
Protocol authentication properties are generally trace-based, meaning that authentication holds for the protocol if authentication holds for individual traces (runs of the protoco...
Arnab Roy, Anupam Datta, Ante Derek, John C. Mitch...
HT
2009
ACM
14 years 4 months ago
The redocumentation process of computer mediated activity traces: a general framework
The digital world enables the creation of personalized documents. In this paper we are interested in describing a computer mediated activity by a person throughout a semi-automati...
Leila Yahiaoui, Yannick Prié, Zizette Boufa...
HOTOS
1997
IEEE
14 years 2 months ago
The Role of Trace Modulation in Building Mobile Computing Systems
ty of accurately re-creating a mobile networkingAbstract environment in vitro argues for live experiments. On the In this paper we put forth the view that trace other hand, the dif...
Mahadev Satyanarayanan, Brian Noble
ISQED
2010
IEEE
194views Hardware» more  ISQED 2010»
14 years 4 months ago
Accelerating trace computation in post-silicon debug
— Post-silicon debug comprises a significant and highly variable fraction of the total development time for large chip designs. To accelerate post-silicon debug, BackSpace [1, 2...
Johnny J. W. Kuan, Steven J. E. Wilton, Tor M. Aam...