Sciweavers

4340 search results - page 162 / 868
» Formal Methods and Cryptography
Sort
View
KBS
2006
127views more  KBS 2006»
15 years 4 months ago
Collaborative Recommending using Formal Concept Analysis
We show how Formal Concept Analysis (FCA) can be applied to Collaborative Recommenders. FCA is a mathematical method for analysing binary relations. Here we apply it to the relati...
Patrick du Boucher-Ryan, Derek G. Bridge
FAC
2010
105views more  FAC 2010»
15 years 2 months ago
A formalization of geometric constraint systems and their decomposition
For more than a decade, the trend in geometric constraint systems solving has been to use a geometric decomposition/recombination approach. These methods are generally grounded on...
Pascal Mathis, Simon E. B. Thierry
MTA
2006
283views more  MTA 2006»
15 years 4 months ago
An evaluation of image based steganography methods
- Steganography is a process that involves hiding a message in an appropriate carrier for example an image or an audio file. The carrier can then be sent to a receiver without anyo...
Karen Bailey, Kevin Curran
ASPDAC
2009
ACM
249views Hardware» more  ASPDAC 2009»
15 years 8 months ago
Automatic generation of Cycle Accurate and Cycle Count Accurate transaction level bus models from a formal model
— This paper proposes the first automatic approach to simultaneously generate Cycle Accurate and Cycle Count Accurate transaction level bus models. Since TLM (Transaction Level M...
Chen Kang Lo, Ren-Song Tsay
191
Voted
AISC
2010
Springer
15 years 8 months ago
Structured Formal Development with Quotient Types in Isabelle/HOL
General purpose theorem provers provide sophisticated proof methods, but lack some of the advanced structuring mechanisms found in specification languages. This paper builds on pr...
Maksym Bortin, Christoph Lüth