Sciweavers

4340 search results - page 783 / 868
» Formal Methods and Cryptography
Sort
View
TVLSI
2008
151views more  TVLSI 2008»
15 years 4 months ago
Guest Editorial Special Section on Design Verification and Validation
ion levels. The framework also supports the generation of test constraints, which can be satisfied using a constraint solver to generate tests. A compositional verification approac...
I. Harris, D. Pradhan
JUCS
2007
118views more  JUCS 2007»
15 years 4 months ago
A Model of Immune Gene Expression Programming for Rule Mining
: Rule mining is an important issue in data mining. To address it, a novel Immune Gene Expression Programming (IGEP) model was proposed. Concepts of rule, gene, immune cell, and an...
Tao Zeng, Changjie Tang, Yong Xiang, Peng Chen, Yi...
CAGD
2004
141views more  CAGD 2004»
15 years 4 months ago
Almost rotation-minimizing rational parametrization of canal surfaces
Almost rotation minimizing parametrization of the canal surface is given. The basic building block of our approach is the curve approximation scheme that enables us to construct a...
Hyeong In Choi, Song-Hwa Kwon, Nam-Sook Wee
CJ
2004
105views more  CJ 2004»
15 years 4 months ago
Generalized Template Splay: A Basic Theory and Calculus
act interpretation. R. Barbuti, C. Bernardeschi and N. De Francesco With mobile technology more and more prominent, the problem of security leakages becomes more and more important...
George F. Georgakopoulos, David J. McClurkin
AAMAS
1999
Springer
15 years 4 months ago
Verifying Compliance with Commitment Protocols
Interaction protocols are specific, often standard, constraints on the behaviors of autonomous agents in a multiagent system. Protocols are essential to the functioning of open sys...
Mahadevan Venkatraman, Munindar P. Singh