Sciweavers

2200 search results - page 272 / 440
» Hop Integrity in Computer Networks
Sort
View
124
Voted
EMSOFT
2005
Springer
15 years 9 months ago
SHIM: a deterministic model for heterogeneous embedded systems
— Typical embedded hardware/software systems are implemented using a combination of C and an HDL such as Verilog. While each is well-behaved in isolation, combining the two gives...
Stephen A. Edwards, Olivier Tardieu
219
Voted
NFM
2011
335views Formal Methods» more  NFM 2011»
14 years 10 months ago
CORAL: Solving Complex Constraints for Symbolic PathFinder
Symbolic execution is a powerful automated technique for generating test cases. Its goal is to achieve high coverage of software. One major obstacle in adopting the technique in pr...
Matheus Souza, Mateus Borges, Marcelo d'Amorim, Co...
123
Voted
ESCIENCE
2007
IEEE
15 years 10 months ago
Cross-Middleware Interoperability in Distributed Concurrent Engineering
Secure, distributed collaboration between different organizations is a key challenge in Grid computing today. The GDCD project has produced a Grid-based demonstrator Virtual Colla...
E. Rowland Watkins, Mark McArdle, Thomas Leonard, ...
102
Voted
WMTE
2002
IEEE
15 years 8 months ago
To Unlock the Learning Value of Wireless Mobile Devices, Understand Coupling
Handheld computers will become an increasingly compelling choice of technology for K-12 classrooms because they will enable a transition from occasional, supplemental use to frequ...
Jeremy Roschelle, Charles Patton, Roy D. Pea
135
Voted
FCCM
2004
IEEE
133views VLSI» more  FCCM 2004»
15 years 7 months ago
A Methodology for Synthesis of Efficient Intrusion Detection Systems on FPGAs
Intrusion detection for network security is a computation intensive application demanding high system performance. System level design, a relatively unexplored field in this area,...
Zachary K. Baker, Viktor K. Prasanna