Sciweavers

2694 search results - page 470 / 539
» A Description Logic of Change
Sort
View
MM
1998
ACM
79views Multimedia» more  MM 1998»
14 years 5 days ago
Organizing Multicast Receivers Deterministically by Packet-Loss Correlation
The ability to trace multicast paths is currently available in the Internet by means of IGMP MTRACE packets. We introduce Tracer, the rst protocol that organizes the receivers of ...
Brian Neil Levine, Sanjoy Paul, J. J. Garcia-Luna-...
KR
1998
Springer
14 years 5 days ago
Specifying Transactions for Extended Abduction
Extended abduction introduced by Inoue and Sakama (1995) generalizes traditional abduction in the sense that it can compute negative explanations by removing hypotheses from a non...
Katsumi Inoue, Chiaki Sakama
SIGMOD
1997
ACM
107views Database» more  SIGMOD 1997»
14 years 4 days ago
Picture Programming Project
Visual Language (VL) system development is getting increasingly sophisticated in part due to the arduous nature of user interface (UI) code development. This typically involves id...
Nita Goyal, Charles Hoch, Ravi Krishnamurthy, Bria...
DAC
1994
ACM
14 years 1 days ago
Automatic Verification of Pipelined Microprocessors
Abstract - We address the problem of automatically verifying large digital designs at the logic level, against high-level specifications. In this paper, we present a methodology wh...
Vishal Bhagwati, Srinivas Devadas
CSFW
1992
IEEE
14 years 1 days ago
Secure Dependencies with Dynamic Level Assignments
Most security models explicitly (or implicitly) include the tranquillity principle which prohibits changing the security level of a given piece of information. Yet in practical sy...
Pierre Bieber, Frédéric Cuppens