Sciweavers

234 search results - page 43 / 47
» Examples of Termination
Sort
View
CCS
2001
ACM
15 years 2 months ago
Interoperable strategies in automated trust negotiation
Automated trust negotiation is an approach to establishing trust between strangers through the exchange of digital credentials and the use of access control policies that specify ...
Ting Yu, Marianne Winslett, Kent E. Seamons
DDEP
2000
Springer
15 years 1 months ago
Perceptually-Tuned Grayscale Characters Based on Parametrisable Component Fonts
Abstract. Our component-based parametrisable font system is a newly developed font description and reproduction technology. It incorporates for each basic character shape a softwar...
Changyuan Hu, Roger D. Hersch
ICCAD
1999
IEEE
66views Hardware» more  ICCAD 1999»
15 years 1 months ago
Timing-safe false path removal for combinational modules
A delay abstraction of a combinational module is a compact representation of the delay information of the module, which carries effective pin-to-pin delay for each primary-input/pr...
Yuji Kukimoto, Robert K. Brayton
ICS
2010
Tsinghua U.
15 years 1 months ago
Memory Consistency Conditions for Self-Assembly Programming
: Perhaps the two most significant theoretical questions about the programming of self-assembling agents are: (1) necessary and sufficient conditions to produce a unique terminal a...
Aaron Sterling
61
Voted
FSTTCS
1993
Springer
15 years 1 months ago
Induce-Statements and Induce-Expressions: Constructs for Inductive Programming
A for-loop is somewhat similar to an inductive argument. Just as the truth of a proposition P(n + 1) depends on the truth of P(n), the correctness of iteration n+1 of a for-loop de...
Theodore S. Norvell