Sciweavers

2351 search results - page 180 / 471
» A Method of Requirement Inconsistency Analysis
Sort
View
ICCAD
1999
IEEE
77views Hardware» more  ICCAD 1999»
15 years 9 months ago
Symbolic functional and timing verification of transistor-level circuits
We introduce a new method of verifying the timing of custom CMOS circuits. Due to the exponential number of patterns required, traditional simulation methods are unable to exhaust...
Clayton B. McDonald, Randal E. Bryant
PKDD
2001
Springer
127views Data Mining» more  PKDD 2001»
15 years 9 months ago
Sentence Filtering for Information Extraction in Genomics, a Classification Problem
In some domains, Information Extraction (IE) from texts requires syntactic and semantic parsing. This analysis is computationally expensive and IE is potentially noisy if it applie...
Claire Nedellec, Mohamed Ould Abdel Vetah, Philipp...
NETWORKING
2004
15 years 6 months ago
Efficient, Authenticated, and Fault-Tolerant Key Agreement for Dynamic Peer Groups
We present an efficient authenticated and fault-tolerant protocol (AFTD) for tree-based key agreement. Our approach is driven by the insight that when a Diffie-Hellman blinded key ...
Li Zhou, Chinya V. Ravishankar
HICSS
2006
IEEE
132views Biometrics» more  HICSS 2006»
15 years 10 months ago
Supporting the Module Sequencing Decision in the ERP Implementation Process
An important part of the Enterprise Resource Planning (ERP) system implementation process is the decision, which modules are implemented and in which order. We posit that the deci...
Petri Hallikainen, Harri Kimpimäki, Hannu Kiv...
IJCNN
2000
IEEE
15 years 9 months ago
Applying CMAC-Based On-Line Learning to Intrusion Detection
The timely and accurate detection of computer and network system intrusions has always been an elusive goal for system administrators and information security researchers. Existin...
James Cannady