Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Artigo
|
Impact of Denial of Service Attacks on Ad Hoc NetworksAad, I. ; Hubaux, J.-P. ; Knightly, E.W.IEEE/ACM transactions on networking, 2008-08, Vol.16 (4), p.791-802 [Periódico revisado por pares]New York: IEEETexto completo disponível |
|
2 |
Material Type: Capítulo de Livro
|
A Hazards-Based Correctness Statement for Pipelined CircuitsAagaard, Mark D.Correct Hardware Design and Verification Methods, 2003, p.66-80 [Periódico revisado por pares]Berlin, Heidelberg: Springer Berlin HeidelbergTexto completo disponível |
|
3 |
Material Type: Ata de Congresso
|
Relating Multi-step and Single-Step Microprocessor Correctness StatementsAagaard, Mark D. ; Day, Nancy A. ; Lou, MengFormal Methods in Computer-Aided Design, 2002, p.123-141 [Periódico revisado por pares]Berlin, Heidelberg: Springer Berlin HeidelbergTexto completo disponível |
|
4 |
Material Type: Capítulo de Livro
|
Xs Are for Trajectory Evaluation, Booleans Are for Theorem ProvingAagaard, Mark D. ; Melham, Thomas F. ; O’Leary, John W.Correct Hardware Design and Verification Methods, 1999, p.202-218 [Periódico revisado por pares]Berlin, Heidelberg: Springer Berlin HeidelbergTexto completo disponível |
|
5 |
Material Type: magazinearticle
|
Trespass, nuisance, and spam: 11th century common law meets the internetAalberts, Robert ; Poon, Percy ; Thistle, PaulCommunications of the ACM, 2007-12, Vol.50 (12), p.40-45New York, NY: ACMTexto completo disponível |
|
6 |
Material Type: magazinearticle
|
The threat of long-arm jurisdiction to electronic commerceAalberts, Robert ; Townsend, Anthony ; Whitman, MichaelCommunications of the ACM, 1998-12, Vol.41 (12), p.15-20New York: ACMTexto completo disponível |
|
7 |
Material Type: Artigo
|
Hybrid Architectures for Efficient and Secure Face Authentication in Embedded SystemsAaraj, N. ; Ravi, S. ; Raghunathan, A. ; Jha, N.K.IEEE transactions on very large scale integration (VLSI) systems, 2007-03, Vol.15 (3), p.296-308 [Periódico revisado por pares]Piscataway, NJ: IEEETexto completo disponível |
|
8 |
Material Type: Artigo
|
A framework for defending embedded systems against software attacksAaraj, Najwa ; Raghunathan, Anand ; Jha, NirajACM transactions on embedded computing systems, 2011-04, Vol.10 (3), p.1-23 [Periódico revisado por pares]ACMTexto completo disponível |
|
9 |
Material Type: magazinearticle
|
Quantum moneyAaronson, Scott ; Farhi, Edward ; Gosset, David ; Hassidim, Avinatan ; Kelner, Jonathan ; Lutomirski, AndrewCommunications of the ACM, 2012-08, Vol.55 (8), p.84-92New York, NY: ACMTexto completo disponível |
|
10 |
Material Type: magazinearticle
|
Designing concurrent and distributed control systemsAarsten, Amund ; Brugali, Davide ; Menga, GiuseppeCommunications of the ACM, 1996-10, Vol.39 (10), p.50-58New York: ACMTexto completo disponível |