Sciweavers

1169 search results - page 98 / 234
» Two Ways to Common Knowledge
Sort
View
PROFES
2004
Springer
15 years 3 months ago
Combining Capability Assessment and Value Engineering: A BOOTSTRAP Example
Process improvement is a challenging task for software engineering. As Kuvaja [7]. has stated it:” It is difficult to find a unique way to identify a common improvement path suit...
Pasi Ojala
ASIACRYPT
2003
Springer
15 years 3 months ago
Leakage-Resilient Authenticated Key Establishment Protocols
Authenticated Key Establishment (AKE) protocols enable two entities, say a client (or a user) and a server, to share common session keys in an authentic way. In this paper, we revi...
SeongHan Shin, Kazukuni Kobara, Hideki Imai
DAC
2010
ACM
15 years 1 months ago
Eyecharts: constructive benchmarking of gate sizing heuristics
—Discrete gate sizing is one of the most commonly used, flexible, and powerful techniques for digital circuit optimization. The underlying problem has been proven to be NP-hard ...
Puneet Gupta, Andrew B. Kahng, Amarnath Kasibhatla...
GPCE
2007
Springer
15 years 1 months ago
Library composition and adaptation using c++ concepts
Large scale software is composed of libraries produced by different entities. Non-intrusive and efficient mechanisms for adapting data structures from one library to conform to AP...
Jaakko Järvi, Matthew A. Marcus, Jacob N. Smi...
ECOOP
2006
Springer
15 years 1 months ago
Modeling Runtime Behavior in Framework-Based Applications
Abstract. Our research group has analyzed many industrial, frameworkbased applications. In these applications, simple functionality often requires excessive runtime activity. It is...
Nick Mitchell, Gary Sevitsky, Harini Srinivasan