Sciweavers

79
Voted
ASPDAC
2006
ACM
82views Hardware» more  ASPDAC 2006»
15 years 7 months ago
Discovering the input assumptions in specification refinement coverage
The design of a large chip is typically hierarchical
Prasenjit Basu, Sayantan Das, Pallab Dasgupta, Par...
ASIAN
2006
Springer
98views Algorithms» more  ASIAN 2006»
15 years 7 months ago
Information Hiding in the Join Calculus
Abstract. We aim to provide information hiding support in concurrent object-oriented programming languages. We study the issue both at the object level and class level, in the cont...
Qin Ma 0002, Luc Maranget
CIARP
2004
Springer
15 years 7 months ago
New Bounds and Approximations for the Error of Linear Classifiers
In this paper, we derive lower and upper bounds for the probability of error for a linear classifier, where the random vectors representing the underlying classes obey the multivar...
Luís G. Rueda
ASIAN
2006
Springer
153views Algorithms» more  ASIAN 2006»
15 years 7 months ago
Automata-Based Confidentiality Monitoring
Abstract Non-interference is typically used as a baseline security policy to formalize confidentiality of secret information manipulated by a program. In contrast to static checkin...
Gurvan Le Guernic, Anindya Banerjee, Thomas P. Jen...
117
Voted
ASIAN
2006
Springer
126views Algorithms» more  ASIAN 2006»
15 years 7 months ago
Certificateless Authenticated Two-Party Key Agreement Protocols
Tarjei K. Mandt, Chik How Tan