Sciweavers

9730 search results - page 1791 / 1946
» Relating models of backtracking
Sort
View
FM
2006
Springer
153views Formal Methods» more  FM 2006»
15 years 8 months ago
Formal Methods and Cryptography
Security-critical systems are an important application area for formal methods. However, such systems often contain cryptographic subsystems. The natural definitions of these subsy...
Michael Backes, Birgit Pfitzmann, Michael Waidner
CAV
2000
Springer
138views Hardware» more  CAV 2000»
15 years 8 months ago
Counterexample-Guided Abstraction Refinement
xample-Guided Abstraction Refinement for Symbolic Model Checking EDMUND CLARKE YUAN LU Carnegie Mellon University, Pittsburgh, Pennsylvania Broadcom Co., San Jose, California ORNA ...
Edmund M. Clarke, Orna Grumberg, Somesh Jha, Yuan ...
EDBT
2000
ACM
15 years 8 months ago
Temporal View Self-Maintenance
Warehouse view self-maintenance refers to maintaining materialized views at a data warehouse without accessing source data. Self-maintenance has been studied for nontemporal views...
Jun Yang 0001, Jennifer Widom
ICSE
2000
IEEE-ACM
15 years 8 months ago
Software engineering and performance: a road-map
Software engineering has traditionally focussed on functional requirements and how to build software that has few bugs and can be easily maintained. Most design approaches include...
Rob Pooley
PATMOS
2000
Springer
15 years 8 months ago
Dynamic Memory Design for Low Data-Retention Power
Abstract. The emergence of data-intensive applications in mobile environments has resulted in portable electronic systems with increasingly large dynamic memories. The typical oper...
Joohee Kim, Marios C. Papaefthymiou
« Prev « First page 1791 / 1946 Last » Next »