Sciweavers

5344 search results - page 345 / 1069
» Privacy-Preserving Set Operations
Sort
View
171
Voted
SP
1999
IEEE
194views Security Privacy» more  SP 1999»
15 years 9 months ago
Detecting Intrusions using System Calls: Alternative Data Models
Intrusion detection systems rely on a wide variety of observable data to distinguish between legitimate and illegitimate activities. In this paper we study one such observable-seq...
Christina Warrender, Stephanie Forrest, Barak A. P...
ICALP
1998
Springer
15 years 8 months ago
Metric Semantics for True Concurrent Real Time
This paper investigates the use of a complete metric space framework for providing denotational semantics to a real-time process algebra. The study is carried out in a non-interlea...
Christel Baier, Joost-Pieter Katoen, Diego Latella
139
Voted
TIME
1997
IEEE
15 years 8 months ago
Modal Event Calculi with Preconditions
Kowalski and Sergot’s Event Calculus (EC) is a simple temporal formalism that, given a set of event occurrences, allows the derivation of the maximal validity intervals (MVIs) o...
Iliano Cervesato, Massimo Franceschet, Angelo Mont...
DAC
1996
ACM
15 years 8 months ago
A Hardware/Software Partitioning Algorithm for Designing Pipelined ASIPs with Least Gate Counts
Abstract -- This paper introduces a new HW/SW partitioning algorithm used in automating the instruction set processor design for pipelined ASIP (Application Specific Integrated Pro...
Nguyen-Ngoc Bình, Masaharu Imai, Akichika S...
115
Voted
ICCAD
1993
IEEE
81views Hardware» more  ICCAD 1993»
15 years 8 months ago
Inverter minimization in multi-level logic networks
In this paper, we look at the problem of inverter minimization in multi-level logic networks. The network is specified in terms of a set of base functions and the inversion opera...
Alok Jain, Randal E. Bryant