Sciweavers

434 search results - page 62 / 87
» Logical Analysis of Hash Functions
Sort
View
108
Voted
DEXA
2008
Springer
85views Database» more  DEXA 2008»
15 years 2 months ago
Reordering of Location Identifiers for Indexing an RFID Tag Object Database
The query performance for tracing tags depends upon the distribution of tag trajectories in the data space. We examine a more efficient representation of tag trajectories by means ...
Sungwoo Ahn, Bonghee Hong
TPLP
2002
69views more  TPLP 2002»
15 years 1 days ago
Soundness, idempotence and commutativity of set-sharing
It is important that practical data-flow analyzers are backed by reliably proven theoretical Abstract interpretation provides a sound mathematical framework and necessary properti...
Patricia M. Hill, Roberto Bagnara, Enea Zaffanella
105
Voted
DATE
2006
IEEE
145views Hardware» more  DATE 2006»
15 years 6 months ago
Building a better Boolean matcher and symmetry detector
Boolean matching is a powerful technique that has been used in technology mapping to overcome the limitations of structural pattern matching. The current basis for performing Bool...
Donald Chai, Andreas Kuehlmann
99
Voted
SEKE
2004
Springer
15 years 5 months ago
Integrating Security Administration into Software Architectures Design
Software architecture plays a central role in developing software systems that satisfy functionality and security requirements. However, little has been done to integrate system d...
Huiqun Yu, Xudong He, Yi Deng, Lian Mo
AGP
1998
IEEE
15 years 4 months ago
The Correctness of Set-Sharing
It is important that practical data flow analysers are backed bly proven theoretical results. Abstract interpretation provides a sound mathematical framework and necessary generic ...
Patricia M. Hill, Roberto Bagnara, Enea Zaffanella