Sciweavers

2913 search results - page 209 / 583
» How Much to Copy
Sort
View
75
Voted
DAC
1999
ACM
16 years 1 months ago
Optimization-Intensive Watermarking Techniques for Decision Problems
Recently, a number of watermarking-based intellectual property protection techniques have been proposed. Although they have been applied to different stages in the design process ...
Gang Qu, Jennifer L. Wong, Miodrag Potkonjak
115
Voted
CHI
2007
ACM
16 years 1 months ago
The digital music box: using cultural and critical theory to inform design
This work draws on studies which explore resistance to the music industry's construal of copying music files as theft. Following a previous ethnography on participants' ...
Mark Blythe
115
Voted
HPCA
2001
IEEE
16 years 1 months ago
Reevaluating Online Superpage Promotion with Hardware Support
fipical translation lookaside buffers (TLBs)can map a far smaller region of memory than application footprints demand, and the cost of handling TLB misses therefore limits the per...
Zhen Fang, Lixin Zhang, John B. Carter, Wilson C. ...
99
Voted
CADE
2006
Springer
16 years 1 months ago
Inferring Network Invariants Automatically
Abstract. Verification by network invariants is a heuristic to solve uniform verification of parameterized systems. Given a system P, a network invariant for P is that abstracts th...
Olga Grinchtein, Martin Leucker, Nir Piterman
89
Voted
ICASSP
2009
IEEE
15 years 7 months ago
Time-sensitive behavior dynamics in multimedia fingerprinting social networks
Multimedia social network is a network infrastructure in which the social network members share multimedia contents with all different purposes. Analyzing user behavior in multime...
W. Sabrina Lin, H. Vicky Zhao, K. J. Ray Liu