Sciweavers

15778 search results - page 3046 / 3156
» Aikido and software engineering
Sort
View
FSTTCS
2003
Springer
15 years 3 months ago
Comparing Sequences with Segment Rearrangements
Computational genomics involves comparing sequences based on “similarity” for detecting evolutionary and functional relationships. Until very recently, available portions of th...
Funda Ergün, S. Muthukrishnan, Süleyman ...
FSTTCS
2003
Springer
15 years 3 months ago
On the Covering Steiner Problem
The Covering Steiner problem is a common generalization of the k-MST and Group Steiner problems. An instance of the Covering Steiner problem consists of an undirected graph with ed...
Anupam Gupta, Aravind Srinivasan
ICFEM
2003
Springer
15 years 3 months ago
Formal Proof of a Polychronous Protocol for Loosely Time-Triggered Architectures
The verification of safety critical systems has become an area of increasing importance in computer science. The notion of reactive system has emerged to concentrate on problems r...
Mickaël Kerboeuf, David Nowak, Jean-Pierre Ta...
ICFEM
2003
Springer
15 years 3 months ago
Generic Interacting State Machines and Their Instantiation with Dynamic Features
Interacting State Machines (ISMs) are used to model reactive systems and to express and verify their properties. They can be seen both as automata exchanging messages simultaneousl...
David von Oheimb, Volkmar Lotz
ISMVL
2010
IEEE
209views Hardware» more  ISMVL 2010»
15 years 3 months ago
Secure Design Flow for Asynchronous Multi-valued Logic Circuits
—The purpose of secure devices such as smartcards is to protect secret information against software and hardware attacks. Implementation of the appropriate protection techniques ...
Ashur Rafiev, Julian P. Murphy, Alexandre Yakovlev
« Prev « First page 3046 / 3156 Last » Next »