Sciweavers

956 search results - page 110 / 192
» Multiple Views on System Traces
Sort
View
ICCAD
2002
IEEE
142views Hardware» more  ICCAD 2002»
15 years 7 months ago
SAT and ATPG: Boolean engines for formal hardware verification
In this survey, we outline basic SAT- and ATPGprocedures as well as their applications in formal hardware verification. We attempt to give the reader a trace trough literature and...
Armin Biere, Wolfgang Kunz
GLOBECOM
2007
IEEE
15 years 4 months ago
On the Long-Range Dependent Behaviour of Unidirectional Packet Delay of Wireless Traffic
— In contrast to aggregate inter-packet metrics that quantify the arrival processes of aggregate traffic at a single point in the network, intraflow end-to-end per-packet perform...
Dimitrios P. Pezaros, Manolis Sifalakis, David Hut...
WWW
2006
ACM
15 years 10 months ago
Examining the content and privacy of web browsing incidental information
This research examines the privacy comfort levels of participants if others can view traces of their web browsing activity. During a week-long field study, participants used an el...
Kirstie Hawkey, Kori M. Inkpen
EDBT
2002
ACM
159views Database» more  EDBT 2002»
15 years 10 months ago
Cut-and-Pick Transactions for Proxy Log Mining
Web logs collected by proxy servers, referred to as proxy logs or proxy traces, contain information about Web document accesses by many users against many Web sites. This "man...
Wenwu Lou, Guimei Liu, Hongjun Lu, Qiang Yang
MVA
1992
14 years 11 months ago
High Speed Autofocus for Microscopic Images
2 Computational Theory The processing of biological specimens or the 2.1 Overview examination of material surfaces for quality control requires a fast and precise autofocus system....
J. E. Fischer, D. Homeister, J. Lehmler, G. Roos