Sciweavers

565 search results - page 18 / 113
» A logic for authorization provenance
Sort
View
INTERACT
1997
13 years 8 months ago
Usability Engineering in Industrial Practice
ABSTRACT Do developers use proven usability techniques like user involvement, usability testing, and iterative design in industrial practice? Based on inside knowledge of many diff...
Søren Lauesen
COR
2006
122views more  COR 2006»
13 years 7 months ago
Experimental Analysis of Approximation Algorithms for the Vertex Cover and Set Covering Problems
Several approximation algorithms with proven performance guarantees have been proposed to find approximate solutions to classical combinatorial optimization problems. However, the...
Fernando C. Gomes, Cláudio Nogueira de Mene...
DATE
1999
IEEE
76views Hardware» more  DATE 1999»
13 years 11 months ago
Testing the Configurable Interconnect/Logic Interface of SRAM-Based FPGA's
The objective of this paper is to define a minimum number of configurations for testing the configurable modules that interface the global interconnect and the logic cells of SRAM...
Michel Renovell, Jean Michel Portal, Joan Figueras...
CCS
2008
ACM
13 years 9 months ago
On the protocol composition logic PCL
A recent development in formal security protocol analysis is the Protocol Composition Logic (PCL). We identify a number of problems with this logic as well as with extensions of t...
Cas J. F. Cremers
ICLP
2004
Springer
14 years 26 days ago
MProlog: An Extension of Prolog for Modal Logic Programming
We introduce our implemented modal logic programming system MProlog. This system is written in Prolog as a module for Prolog. Codes, libraries, and most features of Prolog can be u...
Linh Anh Nguyen