Sciweavers

5255 search results - page 918 / 1051
» Formal Methods for Privacy
Sort
View
DASFAA
2005
IEEE
128views Database» more  DASFAA 2005»
15 years 9 months ago
XDO2: A Deductive Object-Oriented Query Language for XML
In the past decade, researchers have combined deductive and object-oriented features to produce systems that are powerful and have excellent modeling capabilities. More recently, a...
Wei Zhang, Tok Wang Ling, Zhuo Chen, Gillian Dobbi...
DATE
2005
IEEE
102views Hardware» more  DATE 2005»
15 years 9 months ago
Modeling of a Reconfigurable OFDM IP Block Family For an RF System Simulator
The idea of design domain specific Mother Model of IP block family as a base of modeling of system integration is presented here. A common reconfigurable Mother Model for ten diff...
Hannu Heusala, Jussi Liedes
DATE
2005
IEEE
109views Hardware» more  DATE 2005»
15 years 9 months ago
Systematic Analysis of Active Clock Deskewing Systems Using Control Theory
— A formal methodology for the analysis of a closed loop clock distribution and active deskewing network is proposed. In this paper an active clock distribution and deskewing net...
Vinil Varghese, Tom Chen, Peter Michael Young
HICSS
2005
IEEE
173views Biometrics» more  HICSS 2005»
15 years 9 months ago
Implementing Rule-Based Monitors within a Framework for Continuous Requirements Monitoring
With the increasing complexity of information systems, it is becoming increasingly unclear as to how information system behaviors relate to stated requirements. Although requireme...
William N. Robinson
120
Voted
ICDAR
2005
IEEE
15 years 9 months ago
Text Degradations and OCR Training
Printing and scanning of text documents introduces degradations to the characters which can be modeled. Interestingly, certain combinations of the parameters that govern the degra...
Elisa H. Barney Smith, Tim L. Andersen