Sciweavers

1999 search results - page 163 / 400
» Finding Reductions Automatically
Sort
View
85
Voted
CHI
2001
ACM
15 years 10 months ago
Accordion summarization for end-game browsing on PDAs and cellular phones
We demonstrate a new browsing technique for devices with small displays such as PDAs or cellular phones. We concentrate on end-game browsing, where the user is close to or on the ...
Orkut Buyukkokten, Hector Garcia-Molina, Andreas P...
ICSE
2003
IEEE-ACM
15 years 10 months ago
Modular Verification of Software Components in C
We present a new methodology for automatic verification of C programs against finite state machine specifications. Our approach is compositional, naturally enabling us to decompos...
Sagar Chaki, Edmund M. Clarke, Alex Groce, Somesh ...
ISQED
2009
IEEE
112views Hardware» more  ISQED 2009»
15 years 5 months ago
Estimation and optimization of reliability of noisy digital circuits
— With continued scaling, reliability is emerging as a critical challenge for the designers of digital circuits. The challenge stems in part from the lack of computationally ef...
Satish Sivaswamy, Kia Bazargan, Marc D. Riedel
ICASSP
2009
IEEE
15 years 4 months ago
Rate efficient remote video file synchronization
Video file synchronization between remote users is an important task in many applications. Re-transmission of a video that has been only slightly modified is expensive, wasteful...
Hao Zhang, Chuohao Yeo, Kannan Ramchandran
79
Voted
SP
2009
IEEE
114views Security Privacy» more  SP 2009»
15 years 4 months ago
Formally Certifying the Security of Digital Signature Schemes
We present two machine-checked proofs of the existential unforgeability under adaptive chosen-message attacks of the Full Domain Hash signature scheme. These proofs formalize the ...
Santiago Zanella Béguelin, Gilles Barthe, B...