Sciweavers

2237 search results - page 422 / 448
» Advanced Prosody Modelling
Sort
View
SP
2000
IEEE
105views Security Privacy» more  SP 2000»
14 years 2 months ago
Open Source in Security: Visiting the Bizarre
Although open-source software development has virtues, there is reason to believe that the approach would not have a significant effect on the security of today’s systems. The ...
Fred B. Schneider
CAISE
2000
Springer
14 years 2 months ago
An Overview of RoZ: A Tool for Integrating UML and Z Specifications
This paper presents an approach and a tool to increase specification quality by using a combination of UML and formal languages. Our approach is based on the expression of the UML ...
Sophie Dupuy, Yves Ledru, Monique Chabre-Peccoud
SIGMOD
1999
ACM
99views Database» more  SIGMOD 1999»
14 years 2 months ago
Belief Reasoning in MLS Deductive Databases
It is envisaged that the application of the multilevel security (MLS) scheme will enhance exibility and e ectiveness of authorization policies in shared enterprise databases and w...
Hasan M. Jamil
ISIPTA
1999
IEEE
116views Mathematics» more  ISIPTA 1999»
14 years 2 months ago
On the Distribution of Natural Probability Functions
The purpose of this note is to describe the underlying insights and results obtained by the authors, and others, in a series of papers aimed at modelling the distribution of `natu...
Jeff B. Paris, Paul N. Watton, George M. Wilmers
ICCAD
1997
IEEE
86views Hardware» more  ICCAD 1997»
14 years 2 months ago
Interconnect design for deep submicron ICs
Interconnect has become the dominating factor in determining circuit performance and reliability in deep submicron designs. In this embedded tutorial, we first discuss the trends...
Jason Cong, David Zhigang Pan, Lei He, Cheng-Kok K...