Sciweavers

2838 search results - page 330 / 568
» Verifying Controlled Components
Sort
View
115
Voted
DAC
2002
ACM
16 years 1 months ago
Software synthesis from synchronous specifications using logic simulation techniques
This paper addresses the problem of automatic generation of implementation software from high-level functional specifications in the context of embedded system on chip designs. So...
Yunjian Jiang, Robert K. Brayton
WWW
2009
ACM
16 years 1 months ago
What's up CAPTCHA?: a CAPTCHA based on image orientation
We present a new CAPTCHA which is based on identifying an image's upright orientation. This task requires analysis of the often complex contents of an image, a task which hum...
Rich Gossweiler, Maryam Kamvar, Shumeet Baluja
CHES
2009
Springer
140views Cryptology» more  CHES 2009»
16 years 1 months ago
On Tamper-Resistance from a Theoretical Viewpoint
Tamper-proof devices are pretty powerful. They can be used to have better security in applications. In this work we observe that they can also be maliciously used in order to defea...
Paulo Mateus, Serge Vaudenay
KDD
2006
ACM
136views Data Mining» more  KDD 2006»
16 years 1 months ago
Mining quantitative correlated patterns using an information-theoretic approach
Existing research on mining quantitative databases mainly focuses on mining associations. However, mining associations is too expensive to be practical in many cases. In this pape...
Yiping Ke, James Cheng, Wilfred Ng
KDD
2002
ACM
169views Data Mining» more  KDD 2002»
16 years 1 months ago
Optimizing search engines using clickthrough data
This paper presents an approach to automatically optimizing the retrieval quality of search engines using clickthrough data. Intuitively, a good information retrieval system shoul...
Thorsten Joachims