Sciweavers

20833 search results - page 3878 / 4167
» Hidden process models
Sort
View
172
Voted
VLSID
2010
IEEE
155views VLSI» more  VLSID 2010»
15 years 2 months ago
Synchronized Generation of Directed Tests Using Satisfiability Solving
Directed test generation is important for the functional verification of complex system-on-chip designs. SAT based bounded model checking is promising for counterexample generatio...
Xiaoke Qin, Mingsong Chen, Prabhat Mishra
128
Voted
WIKIS
2010
ACM
15 years 2 months ago
Toward sensitive information redaction in a collaborative, multilevel security environment
Wikis have proven to be an invaluable tool for collaboration. The most prominent is, of course, Wikipedia. Its open nature is not suitable for all environments; in corporate, gove...
Peter Gehres, Nathan Singleton, George Louthan, Jo...
DOCENG
2009
ACM
15 years 2 months ago
Relating declarative hypermedia objects and imperative objects through the NCL glue language
This paper focuses on the support provided by NCL (Nested Context Language) to relate objects with imperative code content and declarative hypermedia-objects (objects with declara...
Luiz Fernando Gomes Soares, Marcelo Ferreira Moren...
DPHOTO
2009
116views Hardware» more  DPHOTO 2009»
15 years 2 months ago
Interleaved imaging: an imaging system design inspired by rod-cone vision
Under low illumination conditions, such as moonlight, there simply are not enough photons present to create a high quality color image with integration times that avoid camera-sha...
Manu Parmar, Brian A. Wandell
147
Voted
DSN
2009
IEEE
15 years 2 months ago
RRE: A game-theoretic intrusion Response and Recovery Engine
Preserving the availability and integrity of networked computing systems in the face of fast-spreading intrusions requires advances not only in detection algorithms, but also in a...
Saman A. Zonouz, Himanshu Khurana, William H. Sand...
« Prev « First page 3878 / 4167 Last » Next »