Sciweavers

1727 search results - page 34 / 346
» A Technique for Large Automated Mechanism Design Problems
Sort
View
DATE
2006
IEEE
109views Hardware» more  DATE 2006»
15 years 5 months ago
A secure scan design methodology
It has been proven that scan path is a potent hazard for secure chips. Scan based attacks have been recently demonstrated against DES or AES and several solutions have been presen...
David Hély, Frédéric Bancel, ...
DAC
2009
ACM
16 years 25 days ago
Interconnection fabric design for tracing signals in post-silicon validation
Post-silicon validation has become an essential step in the design flow of today's complex integrated circuits. One effective technique that provides real-time visibility to ...
Xiao Liu, Qiang Xu
WWW
2001
ACM
16 years 15 days ago
Communication design for electronic negotiations on the basis of XML schema
Representation of negotiations in electronic markets and their support are important issues in today's e-commerce research. Whereas most activities are focused on automation ...
Michael Ströbel
JLP
2008
108views more  JLP 2008»
14 years 11 months ago
Composition mechanisms for retrenchment
Abstract. Retrenchment is a flexible model evolution formalism that arose as a reaction to the limitations imposed by refinement, and for which the proof obligations feature additi...
Richard Banach, Czeslaw Jeske, Michael Poppleton
TPHOL
1999
IEEE
15 years 4 months ago
Three Tactic Theorem Proving
Abstract. We describe the key features of the proof description language of Declare, an experimental theorem prover for higher order logic. We take a somewhat radical approach to p...
Don Syme