Sciweavers

253 search results - page 25 / 51
» How to Transform an Analyzer into a Verifier
Sort
View
89
Voted
NDSS
2005
IEEE
15 years 6 months ago
On a New Class of Pulsing Denial-of-Service Attacks and the Defense
In this paper we analyze a new class of pulsing denialof-service (PDoS) attacks that could seriously degrade the throughput of TCP flows. During a PDoS attack, periodic pulses of...
Xiapu Luo, Rocky K. C. Chang
CODES
2007
IEEE
15 years 4 months ago
Pointer re-coding for creating definitive MPSoC models
Today's MPSoC synthesis and exploration design flows start abstract input specification model captured in a system level design language. Usually this model is created from a...
Pramod Chandraiah, Rainer Dömer
94
Voted
RA
2003
130views Robotics» more  RA 2003»
15 years 1 months ago
A Parallel Solution Scheme of Inverse Dynamics for Flexible Manipulators
In this paper, we describe a parallel solution scheme of inverse dynamics, and its application to flexible manipulators where elastic deformation and vibration normally occur in c...
Daigoro Isobe, Daisaku Imaizumi
TCS
2010
14 years 10 months ago
Error-repair parsing schemata
Robustness, the ability to analyze any input regardless of its grammaticality, is a desirable property for any system dealing with unrestricted natural language text. Error-repair...
Carlos Gómez-Rodríguez, Miguel A. Al...
104
Voted
CHI
2002
ACM
16 years 24 days ago
Cognitive walkthrough for the web
This paper proposes a transformation of the Cognitive Walkthrough (CW), a theory-based usability inspection method that has proven useful in designing applications that support us...
Marilyn Hughes Blackmon, Peter G. Polson, Muneo Ki...