Sciweavers

3404 search results - page 542 / 681
» C Programming Tutorial
Sort
View
CSFW
1999
IEEE
15 years 2 months ago
A Meta-Notation for Protocol Analysis
Most formal approaches to security protocol analysis are based on a set of assumptions commonly referred to as the "Dolev-Yao model." In this paper, we use a multiset re...
Iliano Cervesato, Nancy A. Durgin, Patrick Lincoln...
CIKM
1999
Springer
15 years 2 months ago
Rule-Based Query Optimization, Revisited
We present the architecture and a performance assessment of an extensible query optimizer written in Venus. Venus is a general-purpose active-database rule language embedded in C+...
Lane Warshaw, Daniel P. Miranker
ISCAS
1999
IEEE
106views Hardware» more  ISCAS 1999»
15 years 2 months ago
Test pattern generation for width compression in BIST
The main objectives of Built-In Self Test (BIST) are the design of test pattern generator circuits which achieve the highest fault coverage, require the shortest sequence of test ...
Paulo F. Flores, Horácio C. Neto, K. Chakra...
KBSE
1999
IEEE
15 years 2 months ago
Evolving Object-Oriented Designs with Refactorings
Refactorings are behavior-preserving program transformations that automate design evolution in object-oriented applications. Three kinds of design evolution are: schema transformat...
Lance Tokuda, Don S. Batory
SP
1999
IEEE
132views Security Privacy» more  SP 1999»
15 years 2 months ago
Detecting Computer and Network Misuse through the Production-based Expert System Toolset (P-BEST)
This paper describes an expert system development toolset called the Production-Based Expert System Toolset (P-BEST) and how it is employed in the development of a modern generic ...
Ulf Lindqvist, Phillip A. Porras