Sciweavers

4307 search results - page 539 / 862
» Dynamic Spyware Analysis
Sort
View
ACSAC
1999
IEEE
15 years 8 months ago
Security Policy Coordination for Heterogeneous Information Systems
Coordinating security policies in information enclaves is challenging due to their heterogeneity and autonomy. Administrators must reconcile the semantic diversity of data and sec...
John Hale, Pablo Galiasso, Mauricio Papa, Sujeet S...
132
Voted
DATE
1999
IEEE
123views Hardware» more  DATE 1999»
15 years 8 months ago
Accounting for Various Register Allocation Schemes During Post-Synthesis Verification of RTL Designs
This paper reports a formal methodology for verifying a broad class of synthesized register-transfer-level (RTL) designs by accommodating various register allocation/optimization ...
Nazanin Mansouri, Ranga Vemuri
ICLP
1992
Springer
15 years 8 months ago
A Declarative View of Inheritance in Logic Programming
We discuss a declarative characterization of inheritance in logic programming. Our approach is inspired both by existing literature on denotational models for inheritance and by e...
Michele Bugliesi
SIGBDP
1990
15 years 8 months ago
Knowledge Acquisition: Issues, Techniques, and Methodology
Technique for Inducing Abstractions", Communications of the ACM, 21(5), 401411, May 1978. [7] Hayes-Roth, Frederick, "Rule-Based Systems", Communications of the ACM,...
Yihwa Irene Liou
CSWWS
2006
15 years 7 months ago
A Distributed Agent System upon Semantic Web Technologies to Provide Biological Data
Bioinformaticians are accustomed to going through analysis steps, in which they employ several data sources, like protein sequence and protein interaction databases, to carry out t...
Farzad Kohantorabi, Gregory Butler, Christopher J....