Sciweavers

655 search results - page 120 / 131
» Automata, Logic, and XML
Sort
View
POPL
1995
ACM
15 years 1 months ago
Default Timed Concurrent Constraint Programming
d Abstract) We extend the model of [VRV94] to express strong time-outs (and pre-emption): if an event A does not happen through time t, cause event B to happen at time t. Such con...
Vijay A. Saraswat, Radha Jagadeesan, Vineet Gupta
DAC
2006
ACM
14 years 11 months ago
Systematic software-based self-test for pipelined processors
Software-based self-test (SBST) has recently emerged as an effective methodology for the manufacturing test of processors and other components in systems-on-chip (SoCs). By moving ...
Mihalis Psarakis, Dimitris Gizopoulos, Miltiadis H...
APLAS
2010
ACM
14 years 9 months ago
Typechecking Higher-Order Security Libraries
Abstract. We propose a flexible method for verifying the security of ML programs that use cryptography and recursive data structures. Our main applications are X.509 certificate ch...
Karthikeyan Bhargavan, Cédric Fournet, Nata...
74
Voted
SIGMOD
2003
ACM
127views Database» more  SIGMOD 2003»
15 years 9 months ago
Cache-and-Query for Wide Area Sensor Databases
Webcams, microphones, pressure gauges and other sensors provide exciting new opportunities for querying and monitoring the physical world. In this paper we focus on querying wide ...
Amol Deshpande, Suman Kumar Nath, Phillip B. Gibbo...
JUCS
2008
210views more  JUCS 2008»
14 years 9 months ago
Systematic Characterisation of Objects in Digital Preservation: The eXtensible Characterisation Languages
: During the last decades, digital objects have become the primary medium to create, shape, and exchange information. However, in contrast to analog objects such as books that dire...
Christoph Becker, Andreas Rauber, Volker Heydegger...