Sciweavers

23915 search results - page 4695 / 4783
» Management
Sort
View
DKE
2002
113views more  DKE 2002»
15 years 4 months ago
A general strategy for decomposing topological invariants of spatial databases and an application
Topological invariants of spatial databases (i.e., finite structures that capture the topological properties of the database) are receiving increasing attention since they can act...
Serafino Cicerone, Daniele Frigioni, Paolino Di Fe...
ET
2002
115views more  ET 2002»
15 years 4 months ago
CAS-BUS: A Test Access Mechanism and a Toolbox Environment for Core-Based System Chip Testing
As System on a Chip (SoC) testing faces new challenges, some new test architectures must be developed. This paper describes a Test Access Mechanism (TAM) named CASBUS that solves ...
Mounir Benabdenbi, Walid Maroufi, Meryem Marzouki
JAR
2000
145views more  JAR 2000»
15 years 4 months ago
Logical Cryptanalysis as a SAT Problem
Cryptographic algorithms play a key role in computer security and the formal analysis of their robustness is of utmost importance. Yet, logic and automated reasoning tools are seld...
Fabio Massacci, Laura Marraro
136
Voted
JNCA
2000
117views more  JNCA 2000»
15 years 4 months ago
Distributed network storage service with quality-of-service guarantees
This paper envisions a distributed network storage service with Quality-ofService (QoS) guarantees, and describes its architecture and key mechanisms. When fully realized, this se...
John Chung-I Chuang, Marvin A. Sirbu
135
Voted
JODL
2000
65views more  JODL 2000»
15 years 4 months ago
Nature: a prototype digital archive
In response to the proposal to digitise the journal Nature (1869->1992), published by Macmillan, a pilot project was commissioned to discover the technical issues and ascertain...
Ross MacIntyre, Simon Tanner
« Prev « First page 4695 / 4783 Last » Next »