Sciweavers

2435 search results - page 386 / 487
» System Exploration of SystemC Designs
Sort
View
SP
2008
IEEE
144views Security Privacy» more  SP 2008»
15 years 10 months ago
Cloaker: Hardware Supported Rootkit Concealment
Rootkits are used by malicious attackers who desire to run software on a compromised machine without being detected. They have become stealthier over the years as a consequence of...
Francis M. David, Ellick Chan, Jeffrey C. Carlyle,...
GLOBECOM
2007
IEEE
15 years 10 months ago
Cognitive Radio Networks: How Much Spectrum Sharing is Optimal?
Abstract—We explore the performance tradeoff between opportunistic and regulated access inherent in the design of multiuser cognitive radio networks. We consider a cognitive radi...
Sudhir Srinivasa, Syed Ali Jafar
EUSAI
2007
Springer
15 years 10 months ago
Context-Sensitive Microlearning of Foreign Language Vocabulary on a Mobile Device
Abstract. We explore the use of ubiquitous sensing in the home for contextsensitive microlearning. To assess how users would respond to frequent and brief learning interactions tie...
Jennifer Beaudin, Stephen S. Intille, Emmanuel Mun...
CCECE
2006
IEEE
15 years 10 months ago
A Formal CSP Framework for Message-Passing HPC Programming
To help programmers of high-performance computing (HPC) systems avoid communication-related errors, we employ a formal process algebra, Communicating Sequential Processes (CSP), w...
John D. Carter, William B. Gardner
HICSS
2006
IEEE
134views Biometrics» more  HICSS 2006»
15 years 10 months ago
Patterns of Multimodal Input Usage in Non-Visual Information Navigation
Multimodal input is known to be advantageous for graphical user interfaces, but its benefits for non-visual interaction are unknown. To explore this issue, an exploratory study wa...
Xiaoyu Chen, Marilyn Tremaine