Sciweavers

623 search results - page 109 / 125
» Declarative Network Verification
Sort
View
HICSS
1998
IEEE
158views Biometrics» more  HICSS 1998»
15 years 6 months ago
Accountability Centered Approach to Business Process Reengineering
In this paper, Accountability Centered Approach (ACA) is proposed for business process engineering. The ACA approach enables the designers and users to focus on the requirements a...
Mitchell M. Tseng, Chuan-Jun Su, Ma Qinhai
GLVLSI
2009
IEEE
172views VLSI» more  GLVLSI 2009»
15 years 5 months ago
Contact merging algorithm for efficient substrate noise analysis in large scale circuits
A methodology is proposed to efficiently estimate the substrate noise generated by large scale aggressor circuits. Small spatial voltage differences within the ground distribution...
Emre Salman, Renatas Jakushokas, Eby G. Friedman, ...
COMPSAC
2004
IEEE
15 years 5 months ago
Services-Oriented Dynamic Reconfiguration Framework for Dependable Distributed Computing
Web services (WS) received significant attention recently because services can be searched, bound, and executed at runtime over the Internet. This paper proposes a dynamic reconfi...
Wei-Tek Tsai, Weiwei Song, Raymond A. Paul, Zhibin...
132
Voted
CAISE
2006
Springer
15 years 5 months ago
Designing Security Requirements Models Through Planning
The quest for designing secure and trusted software has led to refined Software Engineering methodologies that rely on tools to support the design process. Automated reasoning mech...
Volha Bryl, Fabio Massacci, John Mylopoulos, Nicol...
DAC
2005
ACM
15 years 3 months ago
Power grid simulation via efficient sampling-based sensitivity analysis and hierarchical symbolic relaxation
On-chip supply networks are playing an increasingly important role for modern nanometer-scale designs. However, the ever growing sizes of power grids make the analysis problem ext...
Peng Li