Sciweavers

1007 search results - page 96 / 202
» The Complexity of Futile Questioning
Sort
View
100
Voted
APSEC
1997
IEEE
15 years 5 months ago
Legacy Systems Migration : A Method and its Tool-Kit Framework
The problems posed by mission-critical legacy systems - brittleness, inflexibility, isolation, non-extensibility, lack of openness etc. - are well known, but practical solutions h...
Bing Wu, Deirdre Lawless, Jesus Bisbal, Jane Grims...
ICALP
1998
Springer
15 years 5 months ago
Bridges for Concatenation Hierarchies
In the seventies, several classification schemes for the rational languages were proposed, based on the alternate use of certain operators (union, complementation, product and star...
Jean-Eric Pin
DAC
1996
ACM
15 years 5 months ago
RTL Emulation: The Next Leap in System Verification
ion. Production use of text-based methodology has enabled designers to capture designs of hundreds of thousands of gates using graphic ESDA tools. Source: Data Quest (Verilog/VHDL ...
Sanjay Sawant, Paul Giordano
94
Voted
CSFW
1994
IEEE
15 years 5 months ago
One-Representative Safety Analysis in the Non-Monotonic Transform Model
We analyze the safety question for the Non-Monotonic Transform NMT model, an access control model that encompasses a wide variety of practical access control mechanisms. In genera...
Ravi S. Sandhu, Paul Ammann
COLT
1992
Springer
15 years 5 months ago
On the Computational Power of Neural Nets
This paper deals with finite size networks which consist of interconnections of synchronously evolving processors. Each processor updates its state by applying a "sigmoidal&q...
Hava T. Siegelmann, Eduardo D. Sontag