Sciweavers

7393 search results - page 1130 / 1479
» Synthesis-for-testability using transformations
Sort
View
CLEANDB
2006
ACM
312views Database» more  CLEANDB 2006»
15 years 8 months ago
Efficiently Filtering RFID Data Streams
RFID holds the promise of real-time identifying, locating, tracking and monitoring physical objects without line of sight, and can be used for a wide range of pervasive computing ...
Yijian Bai, Fusheng Wang, Peiya Liu
CONCUR
2006
Springer
15 years 8 months ago
Proving Liveness by Backwards Reachability
Abstract. We present a new method for proving liveness and termination properties for fair concurrent programs, which does not rely on finding a ranking function or on computing th...
Parosh Aziz Abdulla, Bengt Jonsson, Ahmed Rezine, ...
DIS
2006
Springer
15 years 8 months ago
Scientific Discovery: A View from the Trenches
One of the primary goals in discovery science is to understand the human scientific reasoning processes. Despite sporadic success of automated discovery systems, few studies have s...
Catherine Blake, Meredith Rendall
FOSSACS
2006
Springer
15 years 8 months ago
Register Allocation After Classical SSA Elimination is NP-Complete
Chaitin proved that register allocation is equivalent to graph coloring and hence NP-complete. Recently, Bouchez, Brisk, and Hack have proved independently that the interference gr...
Fernando Magno Quintão Pereira, Jens Palsbe...
FSE
2006
Springer
99views Cryptology» more  FSE 2006»
15 years 8 months ago
Reducing the Space Complexity of BDD-Based Attacks on Keystream Generators
The main application of stream ciphers is online-encryption of arbitrarily long data, for example when transmitting speech data between a Bluetooth headset and a mobile GSM phone o...
Matthias Krause, Dirk Stegemann
« Prev « First page 1130 / 1479 Last » Next »