Sciweavers

904 search results - page 133 / 181
» Towards practical meta-querying
Sort
View
IH
2007
Springer
15 years 4 months ago
Software Integrity Checking Expressions (ICEs) for Robust Tamper Detection
Abstract. We introduce software integrity checking expressions (SoftICEs), which are program predicates that can be used in software tamper detection. We present two candidates, pr...
Mariusz H. Jakubowski, Prasad Naldurg, Vijay Patan...
LPNMR
2007
Springer
15 years 4 months ago
Debugging ASP Programs by Means of ASP
Answer-set programming (ASP) has become an important paradigm for declarative problem solving in recent years. However, to further improve the usability of answer-set programs, the...
Martin Brain, Martin Gebser, Jörg Pührer...
MTSR
2007
Springer
15 years 3 months ago
Exploring aspects of scientific publishing in astrophysics and cosmology: the views of scientists
Scientists in astrophysics and cosmology make much use of the arXiv repository. Concerns raised by scientists in those fields about publication costs and delays, and the transparen...
Panayiota Polydoratou, Martin Moyle
REFSQ
2007
Springer
15 years 3 months ago
Optimal-Constraint Lexicons for Requirements Specifications
Abstract. Constrained Natural Languages (CNLs) are becoming an increasingly popular way of writing technical documents such as requirements specifications. This is because CNLs aim...
Stephen Boyd, Didar Zowghi, Vincenzo Gervasi
AHS
2006
IEEE
109views Hardware» more  AHS 2006»
15 years 3 months ago
VLSI Design IP Protection: Solutions, New Challenges, and Opportunities
It has been a decade since the need of VLSI design intellectual property (IP) protection was identified [1,2]. The goals of IP protection are 1) to enable IP providers to protect ...
Lin Yuan, Gang Qu, Lahouari Ghouti, Ahmed Bouridan...