Sciweavers

977 search results - page 18 / 196
» Soft Constraints for Security
Sort
View
CSCLP
2003
Springer
15 years 3 months ago
Learning Approximate Consistencies
ing Soft Constraints: Some Experimental Results on Fuzzy CSPs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107 Stefano Bi...
Arnaud Lallouet, Andrei Legtchenko, Thi-Bich-Hanh ...
CORR
2004
Springer
136views Education» more  CORR 2004»
14 years 9 months ago
On Global Warming (Softening Global Constraints)
We describe soft versions of the global cardinality constraint and the regular constraint, with efficient filtering algorithms maintaining domain consistency. For both constraints,...
Willem Jan van Hoeve, Gilles Pesant, Louis-Martin ...
CSFW
1989
IEEE
15 years 1 months ago
Specifying Security Constraints with Relaxation Lattices
Maurice Herlihy, Jeannette M. Wing
ERSA
2009
109views Hardware» more  ERSA 2009»
14 years 7 months ago
An Implementation of Security Extensions for Data Integrity and Confidentiality in Soft-Core Processors
An increasing number of embedded system solutions in space, military, and consumer electronics applications rely on processor cores inside reconfigurable logic devices. Ensuring da...
Austin Rogers, Aleksandar Milenkovic