Sciweavers

8636 search results - page 1333 / 1728
» How Developers Copy
Sort
View
FMCAD
2007
Springer
15 years 8 months ago
Transaction Based Modeling and Verification of Hardware Protocols
Modeling hardware through atomic guard/action transitions with interleaving semantics is popular, owing to the conceptual clarity of modeling and verifying the high level behavior ...
Xiaofang Chen, Steven M. German, Ganesh Gopalakris...
FMCAD
2007
Springer
15 years 8 months ago
Boosting Verification by Automatic Tuning of Decision Procedures
Parameterized heuristics abound in computer aided design and verification, and manual tuning of the respective parameters is difficult and time-consuming. Very recent results from ...
Frank Hutter, Domagoj Babic, Holger H. Hoos, Alan ...
FOAL
2007
ACM
15 years 8 months ago
Requirement enforcement by transformation automata
The goal of this work is to treat safety and security policies as requirements to be composed in an aspectual style with a developing application. Policies can be expressed either...
Douglas R. Smith
125
Voted
SOUPS
2010
ACM
15 years 8 months ago
Towards understanding ATM security: a field study of real world ATM use
With the increase of automated teller machine (ATM) frauds, new authentication mechanisms are developed to overcome security problems of personal identification numbers (PIN). Th...
Alexander De Luca, Marc Langheinrich, Heinrich Hus...
DEXAW
2009
IEEE
95views Database» more  DEXAW 2009»
15 years 8 months ago
Collection-Relative Representations: A Unifying View to Retrieval Models
Various retrieval models have been developed and analyzed so far, but less research aims to an integration of the different models within a common framework. This paper introduces ...
Benno Stein, Maik Anderka
« Prev « First page 1333 / 1728 Last » Next »