Sciweavers

5451 search results - page 942 / 1091
» Typed Operational Semantics
Sort
View
116
Voted
ASPDAC
2008
ACM
108views Hardware» more  ASPDAC 2008»
15 years 5 months ago
Synthesis and design of parameter extractors for low-power pre-computation-based content-addressable memory using gate-block sel
Content addressable memory (CAM) is frequently used in applications, such as lookup tables, databases, associative computing, and networking, that require high-speed searches due t...
Jui-Yuan Hsieh, Shanq-Jang Ruan
153
Voted
ATAL
2008
Springer
15 years 5 months ago
Mitigating catastrophic failure at intersections of autonomous vehicles
Fully autonomous vehicles promise enormous gains in safety, efficiency, and economy. Before such gains can be realized, safety and reliability concerns must be addressed. We have ...
Kurt M. Dresner, Peter Stone
155
Voted
CEAS
2008
Springer
15 years 5 months ago
A Campaign-based Characterization of Spamming Strategies
This paper presents a methodology for the characterization of spamming strategies based on the identification of spam campaigns. To deeply understand how spammers abuse network re...
Pedro Calais, Douglas Pires, Dorgival Olavo Guedes...
125
Voted
NOSSDAV
2010
Springer
15 years 5 months ago
Wireless network interface energy conservation for bottlenecked first mile networks
Placeshifting systems stream videos from the home to a single remote user using the limited upstream capacity of the home broadband link. We analyze the behavior of two placeshift...
Surendar Chandra
119
Voted
CONCUR
2008
Springer
15 years 5 months ago
Modeling Computational Security in Long-Lived Systems
Abstract. For many cryptographic protocols, security relies on the assumption that adversarial entities have limited computational power. This type of security degrades progressive...
Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Nan...