Sciweavers

246 search results - page 13 / 50
» Joinpoint Inference from Behavioral Specification to Impleme...
Sort
View
111
Voted
CASES
2010
ACM
14 years 9 months ago
Implementing virtual secure circuit using a custom-instruction approach
Although cryptographic algorithms are designed to resist at least thousands of years of cryptoanalysis, implementing them with either software or hardware usually leaks additional...
Zhimin Chen, Ambuj Sinha, Patrick Schaumont
86
Voted
HCI
2007
15 years 17 days ago
Understanding RUTH: Creating Believable Behaviors for a Virtual Human Under Uncertainty
In pursuing the ultimate goal of enabling intelligent conversation with a virtual human, two key challenges are selecting nonverbal behaviors to implement and realizing those behav...
Insuk Oh, Matthew Stone
ECOOP
2006
Springer
15 years 2 months ago
Modeling Runtime Behavior in Framework-Based Applications
Abstract. Our research group has analyzed many industrial, frameworkbased applications. In these applications, simple functionality often requires excessive runtime activity. It is...
Nick Mitchell, Gary Sevitsky, Harini Srinivasan
102
Voted
CONEXT
2009
ACM
15 years 6 days ago
Detecting network neutrality violations with causal inference
We present NANO, a system that detects when ISPs apply policies that discriminate against specific classes of applications, users, or destinations. Existing systems for detecting ...
Muhammad Mukarram Bin Tariq, Murtaza Motiwala, Nic...
ASYNC
2007
IEEE
129views Hardware» more  ASYNC 2007»
15 years 3 months ago
Formal Verification of CHP Specifications with CADP Illustration on an Asynchronous Network-on-Chip
Few formal verification techniques are currently available for asynchronous designs. In this paper, we describe a new approach for the formal verification of asynchronous architec...
Gwen Salaün, Wendelin Serwe, Yvain Thonnart, ...