Sciweavers

4690 search results - page 65 / 938
» An operational semantics for Scheme
Sort
View
DOLAP
1999
ACM
15 years 4 months ago
Characterization of Hierarchies and Some Operators in OLAP Environment
Recently numerous proposals for modelling and querying Multidimensional Databases (MDDB) are proposed. Among the still open problems there is a rigorous classification of the diff...
Elaheh Pourabbas, Maurizio Rafanelli
AMC
2005
150views more  AMC 2005»
14 years 11 months ago
High order fitted operator numerical method for self-adjoint singular perturbation problems
We consider self-adjoint singularly perturbed two-point boundary value problems in conservation form. Highest possible order of uniform convergence for such problems achieved hith...
Kailash C. Patidar
VLSID
2002
IEEE
116views VLSI» more  VLSID 2002»
16 years 7 days ago
Register Transfer Operation Analysis during Data Path Verification
A control part ? data path partition based sequential circuit verification scheme aimed at avoiding state explosion comprises two major modules namely, a data path verifier and a ...
D. Sarkar
DATE
2009
IEEE
133views Hardware» more  DATE 2009»
15 years 6 months ago
SecBus: Operating System controlled hierarchical page-based memory bus protection
—This paper presents a new two-levels page-based memory bus protection scheme. A trusted Operating System drives a hardware cryptographic unit and manages security contexts for e...
Lifeng Su, Stephan Courcambeck, Pierre Guillemin, ...
FSE
1999
Springer
83views Cryptology» more  FSE 1999»
15 years 4 months ago
On the Security of Double and 2-Key Triple Modes of Operation
The DES has reached the end of its lifetime due to its too short key length and block length (56 and 64 bits respectively). As we are awaiting the new AES, triple (and double) encr...
Helena Handschuh, Bart Preneel