We present a framework for formal verification of embedded custom memories. Memory verification is complicated ifficulty in abstracting design parameters induced by the inherently ...
Information requirements analysis for data warehouse systems differs significantly from requirements analysis for conventional information systems. Existing data warehouse specifi...
In 1998, Blaze, Bleumer, and Strauss proposed an application called atomic proxy re-encryption, in which a semi-trusted proxy converts a ciphertext for Alice into a ciphertext for...
Giuseppe Ateniese, Kevin Fu, Matthew Green, Susan ...
We present the EMF Model Transformation framework (EMT), which supports the rule-based modification of EMF models. Model transformation rules are defined graphically and compiled...
The recursive descent parsing method for the context-free grammars is extended for their generalization, Boolean grammars, which include explicit set-theoretic operations in the f...