Sciweavers

537 search results - page 52 / 108
» tools 1999
Sort
View
ACSAC
1999
IEEE
15 years 2 months ago
Using Checkable Types in Automatic Protocol Analysis
The Automatic Authentication Protocol Analyzer, 2nd Version AAPA2 is a fast, completely automatic tool for formally analyzing cryptographic protocols. It correctly identi es vulne...
Stephen H. Brackin
ASPDAC
1999
ACM
149views Hardware» more  ASPDAC 1999»
15 years 2 months ago
The Hierarchical h-Adaptive 3-D Boundary Element Computation of VLSI Interconnect Capacitance
: In VLSI circuits with deep sub-micron, the parasitic capacitance from interconnect is a very important factor determining circuit performances such as power and time-delay. The B...
Jinsong Hou, Zeyi Wang, Xianlong Hong
CHI
1999
ACM
15 years 2 months ago
Principles of Mixed-Initiative User Interfaces
Recent debate has centered on the relative promise of focusing user-interface research on developing new metaphors and tools that enhance users’ abilities to directly manipulate...
Eric Horvitz
CSMR
1999
IEEE
15 years 2 months ago
Restructuring of COBOL/CICS Legacy Systems
We provide a strategy to restructure transaction processing systems. Such systems are core assets of most modern business operations, so their enhancement is crucial. Before large...
Alex Sellink, Chris Verhoef, Harry M. Sneed
ICAIL
1999
ACM
15 years 2 months ago
Intelligent jurisprudence research: a new concept
Intelligent Jurisprudence Research (IJR) is a concept that consists in performing jurisprudence research with a computational tool that employs Artificial Intelligence (AI) techni...
Rosina Weber