Sciweavers

1369 search results - page 209 / 274
» A Practical Implementation of the Timing Attack
Sort
View
ICDE
2007
IEEE
145views Database» more  ICDE 2007»
16 years 12 days ago
Rewriting Regular XPath Queries on XML Views
We study the problem of answering queries posed on virtual views of XML documents, a problem commonly encountered when enforcing XML access control and integrating data. We approa...
Wenfei Fan, Floris Geerts, Xibei Jia, Anastasios K...
DAC
1998
ACM
16 years 8 hour ago
A Case Study in Embedded System Design: An Engine Control Unit
A number of techniques and software tools for embedded system design have been recently proposed. However, the current practice in the designer community is heavily based on manua...
Alberto L. Sangiovanni-Vincentelli, Antonino Damia...
ICML
2003
IEEE
15 years 12 months ago
Adaptive Overrelaxed Bound Optimization Methods
We study a class of overrelaxed bound optimization algorithms, and their relationship to standard bound optimizers, such as ExpectationMaximization, Iterative Scaling, CCCP and No...
Ruslan Salakhutdinov, Sam T. Roweis
CHI
2008
ACM
15 years 11 months ago
Ninja cursors: using multiple cursors to assist target acquisition on large screens
We propose the "ninja cursor" to improve the performance of target acquisition, particularly on large screens. This technique uses multiple distributed cursors to reduce...
Masatomo Kobayashi, Takeo Igarashi
VLSID
2002
IEEE
136views VLSI» more  VLSID 2002»
15 years 11 months ago
Buffered Routing Tree Construction under Buffer Placement Blockages
Interconnect delay has become a critical factor in determining the performance of integrated circuits. Routing and buffering are powerful means of improving the circuit speed and ...
Wei Chen, Massoud Pedram, Premal Buch