Sciweavers

307 search results - page 36 / 62
» On the Integrity of Lightweight Checkpoints
Sort
View
FMCAD
2000
Springer
15 years 4 months ago
A Methodology for Large-Scale Hardware Verification
Abstract. We present a formal verification methodology for datapathdominated hardware. This provides a systematic but flexible framework within which to organize the activities und...
Mark Aagaard, Robert B. Jones, Thomas F. Melham, J...
86
Voted
CHI
2008
ACM
15 years 2 months ago
CiteSense: supporting sensemaking of research literature
Making sense of research literature is a complicated process that involves various information seeking and comprehension tasks. The lack of support for sensemaking in existing sys...
Xiaolong Zhang, Yan Qu, C. Lee Giles, Piyou Song
99
Voted
CORR
2006
Springer
115views Education» more  CORR 2006»
15 years 14 days ago
New security and control protocol for VoIP based on steganography and digital watermarking
In this paper new, lightweight security and control protocol for Voice over Internet Protocol (VoIP) service is presented. It is the alternative for the IETF's (Internet Engi...
Wojciech Mazurczyk, Zbigniew Kotulski
108
Voted
SOFTWARE
2002
15 years 2 days ago
Usage-Centered Engineering for Web Applications
: This paper presents a lightweight form of usage-centered design that has proved particularly effective in designing highly usable Webbased applications. Fully compatible with bot...
Larry L. Constantine, Lucy A. D. Lockwood
92
Voted
INFOCOM
2010
IEEE
14 years 11 months ago
When Watchdog Meets Coding
Abstract—In this paper, we study the problem of misbehavior detection in wireless networks . A commonly adopted approach is to utilize the broadcast nature of the wireless medium...
Guanfeng Liang, Rachit Agarwal, Nitin Vaidya