Sciweavers

786 search results - page 101 / 158
» A Software System for Secure Computer Aided Exams
Sort
View
104
Voted
DAC
2003
ACM
16 years 4 months ago
Automatic trace analysis for logic of constraints
Verification of system designs continues to be a major challenge today. Simulation remains the primary tool for making sure that implementations perform as they should. We present...
Xi Chen, Harry Hsieh, Felice Balarin, Yosinori Wat...
ERCIM
2007
124views more  ERCIM 2007»
15 years 3 months ago
Cancer Treatment Planning with Grid-Based Technology
sented by abstract mathematical structures, and visualization is used to convert these into pictures. At the core of every simulation is a mathematical model that is evaluated by a...
Robert G. Belleman, Michael Scarpa, Bram Stolk
160
Voted
CCS
2008
ACM
15 years 5 months ago
Privacy oracle: a system for finding application leaks with black box differential testing
We describe the design and implementation of Privacy Oracle, a system that reports on application leaks of user information via the network traffic that they send. Privacy Oracle ...
Jaeyeon Jung, Anmol Sheth, Ben Greenstein, David W...
123
Voted
DAC
2004
ACM
16 years 4 months ago
A novel approach for flexible and consistent ADL-driven ASIP design
Architecture description languages (ADL) have been established to aid the design of application-specific instruction-set processors (ASIP). Their main contribution is the automati...
Achim Nohl, Gunnar Braun, Hanno Scharwächter,...
127
Voted
IPPS
2007
IEEE
15 years 10 months ago
Distributed IDS using Reconfigurable Hardware
With the rapid growth of computer networks and network infrastructures and increased dependency on the internet to carry out day-to-day activities, it is imperative that the compo...
Ashok Kumar Tummala, Parimal Patel