Sciweavers

1366 search results - page 222 / 274
» Modularizing Contexted Constraints
Sort
View
ACSAC
2000
IEEE
15 years 3 months ago
A Novel Approach to On-Line Status Authentication of Public-Key Certificates
The widespread use of public networks, such as the Internet, for the exchange of sensitive data, like legally valid documents and business transactions, poses severe security cons...
Eugenio Faldella, Marco Prandini
APSEC
2000
IEEE
15 years 3 months ago
Enterprise modeling using class and instance models
Current object-oriented formalisms, such as UML, focus on describing class models and use instance models only for depicting scenarios. Little attention is being devoted to defini...
Rakesh Agarwal, Giorgio Bruno, Marco Torchiano
DATE
2010
IEEE
148views Hardware» more  DATE 2010»
15 years 3 months ago
Scoped identifiers for efficient bit aligned logging
Abstract--Detailed diagnostic data is a prerequisite for debugging problems and understanding runtime performance in distributed wireless embedded systems. Severe bandwidth limitat...
Roy Shea, Mani B. Srivastava, Young Cho
ICTAI
1999
IEEE
15 years 3 months ago
A Practical Student Model in an Intelligent Tutoring System
In this paper we consider two questions related to student modeling in an intelligent tutoring system: 1) What kind of student model should we build when we design a new system; 2...
Yujian Zhou, Martha W. Evens
VLSID
1999
IEEE
93views VLSI» more  VLSID 1999»
15 years 3 months ago
Spec-Based Repeater Insertion and Wire Sizing for On-chip Interconnect
Recently Lillis, et al. presented an elegant dynamic programming approach to RC interconnect delay optimization through driver sizing, repeater insertion, and, wire sizing which e...
Noel Menezes, Chung-Ping Chen