Sciweavers

2019 search results - page 298 / 404
» Programming with Shared Data Abstractions
Sort
View
VMCAI
2005
Springer
15 years 3 months ago
Cryptographic Protocol Analysis on Real C Code
Abstract. Implementations of cryptographic protocols, such as OpenSSL for example, contain bugs affecting security, which cannot be detected by just analyzing abstract protocols (e...
Jean Goubault-Larrecq, Fabrice Parrennes
EMSOFT
2005
Springer
15 years 3 months ago
A unified HW/SW interface model to remove discontinuities between HW and SW design
One major challenge in System-on-Chip (SoC) design is the definition and design of interfaces between hardware and software. Traditional ASIC designer and software designer model ...
Aimen Bouchhima, Xi Chen, Frédéric P...
PLILP
1993
Springer
15 years 1 months ago
Higher-Order Chaotic Iteration Sequences
Chaotic iteration sequences is a method for approximating fixpoints of monotonic functions proposed by Patrick and Radhia Cousot. It may be used in specialisation algorithms for ...
Mads Rosendahl
EUSFLAT
2009
122views Fuzzy Logic» more  EUSFLAT 2009»
14 years 7 months ago
Production and Transportation Planning - A fuzzy Approach for Minimizing the Total Cost
Abstract-- In this paper, we deal with the production and transportation planning of a household appliances manufacturer that has production facilities and central stores for resel...
Heinrich J. Rommelfanger
ECOOP
2009
Springer
15 years 10 months ago
Remote Batch Invocation for Compositional Object Services
Abstract. Because Remote Procedure Calls do not compose efficiently, designers of distributed object systems use Data Transfer and Remote Fac?ade patterns to create large-granulari...
Ali Ibrahim, Yang Jiao, Eli Tilevich, William R. C...