Sciweavers

834 search results - page 95 / 167
» Anaphora and the Logic of Change
Sort
View
DATE
2009
IEEE
123views Hardware» more  DATE 2009»
14 years 3 months ago
On decomposing Boolean functions via extended cofactoring
—We investigate restructuring techniques based on decomposition/factorization, with the objective to move critical signals toward the output while minimizing area. A specific ap...
Anna Bernasconi, Valentina Ciriani, Gabriella Truc...
WCRE
2008
IEEE
14 years 3 months ago
A Business Process Explorer: Recovering Business Processes from Business Applications
A business process contains a set of logically related tasks executed to fulfill business goals. Business applications enable organizations to automatically perform their daily op...
Jin Guo, Ying Zou
ACNS
2008
Springer
132views Cryptology» more  ACNS 2008»
14 years 3 months ago
Analysis of EAP-GPSK Authentication Protocol
Abstract. The EAP-GPSK protocol is a lightweight, flexible authentication protocol relying on symmetric key cryptography. It is part of an ongoing IETF process to develop authenti...
John C. Mitchell, Arnab Roy, Paul Rowe, Andre Sced...
ER
2007
Springer
141views Database» more  ER 2007»
14 years 3 months ago
Active Meta Modeling Support for Evolving E-contracts
An e-contract is a contract modeled, specified, executed, controlled and monitored by a software system. Econtract evolves over a period of time and there are many scenarios of ch...
P. Radha Krishna, Kamalakar Karlapalem
IFL
2007
Springer
162views Formal Methods» more  IFL 2007»
14 years 3 months ago
Testing Erlang Refactorings with QuickCheck
Abstract. Refactoring is a technique for improving the design of existing programs without changing their behaviour. Wrangler is a tool built at the University of Kent to support E...
Huiqing Li, Simon Thompson