Sciweavers

4134 search results - page 727 / 827
» Collaborative Practice Research
Sort
View
SIGMOD
1999
ACM
99views Database» more  SIGMOD 1999»
15 years 7 months ago
Belief Reasoning in MLS Deductive Databases
It is envisaged that the application of the multilevel security (MLS) scheme will enhance exibility and e ectiveness of authorization policies in shared enterprise databases and w...
Hasan M. Jamil
ICCAD
1999
IEEE
86views Hardware» more  ICCAD 1999»
15 years 7 months ago
Clock skew scheduling for improved reliability via quadratic programming
This paper considers the problem of determining an optimal clock skew schedule for a synchronous VLSI circuit. A novel formulation of clock skew scheduling as a constrained quadrat...
Ivan S. Kourtev, Eby G. Friedman
ICRA
1998
IEEE
100views Robotics» more  ICRA 1998»
15 years 7 months ago
Design for Tolerance of Electro-Mechanical Assemblies
Tolerancing decisions can profoundly impact the quality and cost of electro-mechanical assemblies. Existing approaches to tolerance analysis and synthesis in design entail detailed...
Rachuri Sudarsan, Y. Narahari, Kevin W. Lyons, Ram...
ICCAD
1997
IEEE
76views Hardware» more  ICCAD 1997»
15 years 7 months ago
Simulation methods for RF integrated circuits
Abstract — The principles employed in the development of modern RF simulators are introduced and the various techniques currently in use, or expected to be in use in the next few...
Kenneth S. Kundert
SP
2010
IEEE
226views Security Privacy» more  SP 2010»
15 years 7 months ago
Chip and PIN is Broken
—EMV is the dominant protocol used for smart card payments worldwide, with over 730 million cards in circulation. Known to bank customers as “Chip and PIN”, it is used in Eur...
Steven J. Murdoch, Saar Drimer, Ross J. Anderson, ...