Sciweavers

759 search results - page 23 / 152
» What Can Be Implemented Anonymously
Sort
View
IPPS
2006
IEEE
14 years 3 months ago
FPGA implementation of a license plate recognition SoC using automatically generated streaming accelerators
Modern FPGA platforms provide the hardware and software infrastructure for building a bus-based System on Chip (SoC) that meet the applications requirements. The designer can cust...
Nikolaos Bellas, Sek M. Chai, Malcolm Dwyer, Dan L...
SYNTHESE
2011
96views more  SYNTHESE 2011»
13 years 4 months ago
Models and the locus of their truth
If models can be true, where is their truth located? Giere (e.g. 1988) has suggested an account of theoretical models on which models themselves are not truth-valued. The paper su...
Uskali Mäki
HPDC
2007
IEEE
14 years 1 months ago
Transparent network services via a virtual traffic layer for virtual machines
We claim that network services can be transparently added to existing unmodified applications running inside virtual machine environments. Examples of these network services inclu...
John R. Lange, Peter A. Dinda
FM
2008
Springer
77views Formal Methods» more  FM 2008»
13 years 11 months ago
A Rigorous Approach to Networking: TCP, from Implementation to Protocol to Service
Abstract. Despite more then 30 years of research on protocol specification, the major protocols deployed in the Internet, such as TCP, are described only in informal prose RFCs and...
Tom Ridge, Michael Norrish, Peter Sewell
ISW
2009
Springer
14 years 4 months ago
Privacy-Aware Attribute-Based Encryption with User Accountability
As a new public key primitive, attribute-based encryption (ABE) is envisioned to be a promising tool for implementing fine-grained access control. To further address the concern o...
Jin Li, Kui Ren, Bo Zhu, Zhiguo Wan