Sciweavers

5130 search results - page 958 / 1026
» Constraint Query Languages
Sort
View
ACSAC
2002
IEEE
15 years 5 months ago
A Model for Attribute-Based User-Role Assignment
The Role-Based Access Control (RBAC) model is traditionally used to manually assign users to appropriate roles, based on a specific enterprise policy, thereby authorizing them to ...
Mohammad A. Al-Kahtani, Ravi S. Sandhu
108
Voted
DAC
2009
ACM
15 years 5 months ago
A computing origami: folding streams in FPGAs
Stream processing represents an important class of applications that spans telecommunications, multimedia and the Internet. The implementation of streaming programs in FPGAs has a...
Andrei Hagiescu, Weng-Fai Wong, David F. Bacon, Ro...
LCPC
2001
Springer
15 years 5 months ago
Bridging the Gap between Compilation and Synthesis in the DEFACTO System
Abstract. The DEFACTO project - a Design Environment For Adaptive Computing TechnOlogy - is a system that maps computations, expressed in high-level languages such as C, directly o...
Pedro C. Diniz, Mary W. Hall, Joonseok Park, Byoun...
ECRTS
2000
IEEE
15 years 5 months ago
Prototyping distributed multimedia systems using communicating real-time state machines
This paper describes a methodology for the development of real-time systems and shows its application to the modeling, analysis and implementation of distributed multimedia system...
Giancarlo Fortino, Libero Nigro
119
Voted
ISMVL
2000
IEEE
134views Hardware» more  ISMVL 2000»
15 years 5 months ago
The 2-SAT Problem of Regular Signed CNF Formulas
Signed conjunctive normal form (signed CNF) is a classical conjunctive clause form using a generalized notion of literal, called signed atom. A signed atom is an expression of the...
Bernhard Beckert, Reiner Hähnle, Felip Many&a...