Sciweavers

188 search results - page 27 / 38
» A Formal Implementation of Value Commitment
Sort
View
ICCAD
2007
IEEE
107views Hardware» more  ICCAD 2007»
14 years 4 months ago
Computation of minimal counterexamples by using black box techniques and symbolic methods
— Computing counterexamples is a crucial task for error diagnosis and debugging of sequential systems. If an implementation does not fulfill its specification, counterexamples ...
Tobias Nopper, Christoph Scholl, Bernd Becker
ISMIS
2009
Springer
14 years 2 months ago
Discovering Relevant Cross-Graph Cliques in Dynamic Networks
Abstract. Several algorithms, namely CubeMiner, Trias, and DataPeeler, have been recently proposed to mine closed patterns in ternary relations. We consider here the specific cont...
Loïc Cerf, Tran Bao Nhan Nguyen, Jean-Fran&cc...
WPES
2005
ACM
14 years 1 months ago
Mining rule semantics to understand legislative compliance
Organizations in privacy-regulated industries (e.g. healthcare and financial institutions) face significant challenges when developing policies and systems that are properly align...
Travis D. Breaux, Annie I. Antón
FSTTCS
2003
Springer
14 years 21 days ago
An Equational Theory for Transactions
Abstract. Transactions are commonly described as being ACID: Allor-nothing, Consistent, Isolated and Durable. However, although these words convey a powerful intuition, the ACID pr...
Andrew P. Black, Vincent Cremet, Rachid Guerraoui,...
HICSS
2000
IEEE
101views Biometrics» more  HICSS 2000»
13 years 12 months ago
Strategic Management of IS/IT Functions: The Role of the CIO
Chief information officers (CIOs) have the difficult job of running a function that uses a lot of resources but offers little measurable evidence of its value. Line managers are i...
Petter Gottschalk, Nolan J. Taylor