Sciweavers

2106 search results - page 253 / 422
» Specifying C concepts
Sort
View
PERCOM
2006
ACM
15 years 9 months ago
RFID malware: Design principles and examples
This paper explores the concept of malware for Radio Frequency Identification (RFID) systems -- including RFID exploits, RFID worms, and RFID viruses. We present RFID malware desi...
Melanie R. Rieback, Patrick N. D. Simpson, Bruno C...
FCCM
2009
IEEE
192views VLSI» more  FCCM 2009»
15 years 5 months ago
FPGA Floating Point Datapath Compiler
This paper will describe the architecture of a compiler which will convert an untimed C description of a set of floating point expressions into a synthesizable datapath optimized ...
Martin Langhammer, Tom VanCourt
ICAS
2009
IEEE
184views Robotics» more  ICAS 2009»
15 years 4 months ago
Open IMS Core with VoIP Quality Adaptation
—As IMS becomes more available to academia and industry, the requirements for IMS clients are growing faster than ever. From all IMS components, IMS clients are vital components ...
Is-Haka Mkwawa, Emmanuel Jammeh, Lingfen Sun, Asiy...
78
Voted
ICDAR
2009
IEEE
15 years 4 months ago
Inductive Logic Programming for Symbol Recognition
In this paper, we make an attempt to use Inductive Logic Programming (ILP) to automatically learn non trivial descriptions of symbols, based on a formal description. This work is ...
K. C. Santosh, Bart Lamiroy, Jean-Philippe Ropers
ICNS
2009
IEEE
15 years 4 months ago
Psychometric and Evidentiary Approaches to Simulation Assessment in Packet Tracer Software
Packet Tracer is a comprehensive instructional software application for teaching skills and concepts associated with computer networking. In addition to a wide range of simulation...
Dennis C. Frezzo, John T. Behrens, Robert J. Misle...