Sciweavers

12697 search results - page 2273 / 2540
» Call for Papers
Sort
View
GLVLSI
2009
IEEE
103views VLSI» more  GLVLSI 2009»
15 years 7 months ago
Enhancing bug hunting using high-level symbolic simulation
The miniaturization of transistors in recent technology nodes requires tremendous back-end tuning and optimizations, making bug fixing at later design stages more expensive. Ther...
Hong-Zu Chou, I-Hui Lin, Ching-Sung Yang, Kai-Hui ...
ICC
2009
IEEE
120views Communications» more  ICC 2009»
15 years 7 months ago
Back-of-the-Envelope Computation of Throughput Distributions in CSMA Wireless Networks
— This paper presents a simple method for computing throughputs of links in a CSMA network. We call our method back-of-the-envelop (BoE) computation, because for many network con...
Soung Chang Liew, Caihong Kai, Jason Leung, Bill W...
129
Voted
NDSS
2009
IEEE
15 years 7 months ago
Document Structure Integrity: A Robust Basis for Cross-site Scripting Defense
Cross-site scripting (or XSS) has been the most dominant class of web vulnerabilities in 2007. The main underlying reason for XSS vulnerabilities is that web markup and client-sid...
Yacin Nadji, Prateek Saxena, Dawn Song
133
Voted
QEST
2009
IEEE
15 years 7 months ago
Recent Extensions to Traviando
—Traviando is a trace analyzer and visualizer for simulation traces of discrete event dynamic systems. In this paper, we briefly outline recent extensions of Traviando towards a...
Peter Kemper
QSHINE
2009
IEEE
15 years 7 months ago
Supporting VoIP Services in IEEE 802.11e WLANs
Voice over Internet Protocol (VoIP) over Wireless Local Area Network (WLAN) is becoming popular thanks to its cost efficiency. However, it has been a challenge to provide good qual...
Jeonggyun Yu, Munhwan Choi, Daji Qiao, Sunghyun Ch...
« Prev « First page 2273 / 2540 Last » Next »