Sciweavers

5234 search results - page 267 / 1047
» Method Components - Rationale Revealed
Sort
View
CAV
2007
Springer
111views Hardware» more  CAV 2007»
15 years 8 months ago
Verification Across Intellectual Property Boundaries
In many industries, the share of software components provided by third-party suppliers is steadily increasing. As the suppliers seek to secure their intellectual property (IP) righ...
Sagar Chaki, Christian Schallhart, Helmut Veith
148
Voted
CHES
2006
Springer
134views Cryptology» more  CHES 2006»
15 years 7 months ago
Read-Proof Hardware from Protective Coatings
In cryptography it is assumed that adversaries only have black box access to the secret keys of honest parties. In real life, however, the black box approach is not sufficient beca...
Pim Tuyls, Geert Jan Schrijen, Boris Skoric, Jan v...
EELC
2006
118views Languages» more  EELC 2006»
15 years 7 months ago
Lexicon Convergence in a Population With and Without Metacommunication
How does a shared lexicon arise in population of agents with differing lexicons, and how can this shared lexicon be maintained over multiple generations? In order to get some insig...
Zoran Macura, Jonathan Ginzburg
NSDI
2007
15 years 6 months ago
WiDS Checker: Combating Bugs in Distributed Systems
Despite many efforts, the predominant practice of debugging a distributed system is still printf-based log mining, which is both tedious and error-prone. In this paper, we present...
Xuezheng Liu, Wei Lin, Aimin Pan, Zheng Zhang
EUROPAR
2008
Springer
15 years 5 months ago
Empirical Analysis of a Large-Scale Hierarchical Storage System
To prepare for future peta- or exa-scale computing, it is important to gain a good understanding on what impacts a hierarchical storage system would have on the performance of data...
Weikuan Yu, Sarp Oral, Shane Canon, Jeffrey S. Vet...