Sciweavers

15779 search results - page 2919 / 3156
» Change-oriented software engineering
Sort
View
82
Voted
DRM
2009
Springer
15 years 7 months ago
An implementation experience of domain management in marlin
Digital Rights Management (DRM) is used to protect copyrighted content from unauthorized use. However, this has taken away the jurisdiction of the consumers over their purchased c...
Sye Loong Keoh, Koen Vrielink
70
Voted
FMCAD
2009
Springer
15 years 7 months ago
Scalable conditional equivalence checking: An automated invariant-generation based approach
—Sequential equivalence checking (SEC) technologies, capable of demonstrating the behavioral equivalence of two designs, have grown dramatically in capacity over the past decades...
Jason Baumgartner, Hari Mony, Michael L. Case, Jun...
93
Voted
FSTTCS
2009
Springer
15 years 7 months ago
The Power of Depth 2 Circuits over Algebras
We study the problem of polynomial identity testing (PIT) for depth 2 arithmetic circuits over matrix algebra. We show that identity testing of depth 3 (ΣΠΣ) arithmetic circuit...
Chandan Saha, Ramprasad Saptharishi, Nitin Saxena
85
Voted
FSTTCS
2009
Springer
15 years 7 months ago
Simulation based security in the applied pi calculus
We present a symbolic framework for refinement and composition of security protocols. ework uses the notion of ideal functionalities. These are abstract systems which are secure b...
Stéphanie Delaune, Steve Kremer, Olivier Pe...
90
Voted
FSTTCS
2009
Springer
15 years 7 months ago
Donation Center Location Problem
We introduce and study the donation center location problem, which has an additional application in network testing and may also be of independent interest as a general graph-theor...
Chien-Chung Huang, Zoya Svitkina
« Prev « First page 2919 / 3156 Last » Next »