Sciweavers

1658 search results - page 230 / 332
» Implementing Bit-addressing with Specialization
Sort
View
125
Voted
DL
1998
Springer
138views Digital Library» more  DL 1998»
15 years 8 months ago
Digital Library Information Appliances
Although digital libraries are intended to support education and knowledge work, current digital library interfaces are narrowly focused on retrieval. Furthermore, they are design...
Bill N. Schilit, Morgan N. Price, Gene Golovchinsk...
ESOP
1998
Springer
15 years 8 months ago
Mode-Automata: About Modes and States for Reactive Systems
Abstract. In the eld of reactive system programming, data ow synchronous languages like Lustre BCH+85,CHPP87 or Signal GBBG85 o er a syntax similar to block-diagrams, and can be e ...
Florence Maraninchi, Yann Rémond
FMCAD
1998
Springer
15 years 8 months ago
Combining Symbolic Model Checking with Uninterpreted Functions for Out-of-Order Processor Verification
We present a new approach to the verification of hardware systems with data dependencies using temporal logic symbolic model checking. As a benchmark we take Tomasulo's algori...
Sergey Berezin, Armin Biere, Edmund M. Clarke, Yun...
CVPR
1997
IEEE
15 years 8 months ago
Panoramic mosaics by manifold projection
As the field of view of a picture is much smaller than our own visual field of view, it is common to paste together several pictures to create a panoramic mosaic having a larger...
Shmuel Peleg, Joshua Herman
SP
1997
IEEE
135views Security Privacy» more  SP 1997»
15 years 8 months ago
Analysis of a Denial of Service Attack on TCP
This paper analyzes a network-baseddenial of service attack for IP (Internet Protocol) based networks. It is popularly called SYN flooding. It works by an attacker sending many T...
Christoph L. Schuba, Ivan Krsul, Markus G. Kuhn, E...