Sciweavers

756 search results - page 64 / 152
» Using Architecture Models to Support the Generation and Oper...
Sort
View
IISWC
2008
IEEE
14 years 3 months ago
A workload for evaluating deep packet inspection architectures
—High-speed content inspection of network traffic is an important new application area for programmable networking systems, and has recently led to several proposals for high-per...
Michela Becchi, Mark A. Franklin, Patrick Crowley
SP
2003
IEEE
121views Security Privacy» more  SP 2003»
14 years 2 months ago
Specifying and Verifying Hardware for Tamper-Resistant Software
We specify a hardware architecture that supports tamper-resistant software by identifying an “idealized” hich gives the abstracted actions available to a single user program. ...
David Lie, John C. Mitchell, Chandramohan A. Thekk...
IUI
2009
ACM
14 years 5 months ago
Designing user interface adaptation rules with T: XML
The specification of model adaptation and generation rules is a topic of great interest for the user interface development community, since there are more and more approaches supp...
Víctor López-Jaquero, Francisco Mont...
MOBICOM
2000
ACM
14 years 1 months ago
W-mail: an electronic mail system for wearable computing environments
This paper describes an e-mail system for wearable computing environments. In this system, we extend the conventional mail format and the server/client(browser) architecture by co...
Hirotaka Ueda, Masahiko Tsukamoto, Shojiro Nishio
CAV
2009
Springer
209views Hardware» more  CAV 2009»
14 years 9 months ago
Static and Precise Detection of Concurrency Errors in Systems Code Using SMT Solvers
Context-bounded analysis is an attractive approach to verification of concurrent programs. Bounding the number of contexts executed per thread not only reduces the asymptotic compl...
Shuvendu K. Lahiri, Shaz Qadeer, Zvonimir Rakamari...