Sciweavers

360 search results - page 39 / 72
» Detecting Intrusions Specified in a Software Specification L...
Sort
View
FPL
2005
Springer
119views Hardware» more  FPL 2005»
15 years 3 months ago
Real-Time Feature Extraction for High Speed Networks
With the onset of Gigabit networks, current generation networking components will soon be insufficient for numerous reasons: most notably because existing methods cannot support h...
David Nguyen, Gokhan Memik, Seda Ogrenci Memik, Al...
IFIP
2000
Springer
15 years 1 months ago
Test Case Design for the Validation of Component-Based Embedded Systems
The validation of functional and real-time requirements of control software for embedded systems is a difficult task. It usually needs the electronic control unit (ECU) and the co...
W. Fleisch
DATE
1999
IEEE
120views Hardware» more  DATE 1999»
15 years 2 months ago
Hardware Synthesis from C/C++ Models
Software programming languages, such as C/C++, have been used as means for specifying hardware for quite a while. Different design methodologies have exploited the advantages of f...
Giovanni De Micheli
COLING
1990
14 years 11 months ago
A Logic-Based Government-Binding Parser for Mandarin Chinese
Mandarin Chinese is a highly flexible and context-sensitive language. It is difficult to do the case marking and index assignment during the parsing of Chinese sentences. This pap...
Hsin-Hsi Chen
POPL
2012
ACM
13 years 5 months ago
Access permission contracts for scripting languages
The ideal software contract fully specifies the behavior of an operation. Often, in particular in the context of scripting languages, a full specification may be cumbersome to s...
Phillip Heidegger, Annette Bieniusa, Peter Thieman...