Sciweavers

1466 search results - page 212 / 294
» Completeness of the Authentication Tests
Sort
View
CHARME
2003
Springer
196views Hardware» more  CHARME 2003»
14 years 1 months ago
Analyzing the Intel Itanium Memory Ordering Rules Using Logic Programming and SAT
We present a non-operational approach to specifying and analyzing shared memory consistency models. The method uses higher order logic to capture a complete set of ordering constra...
Yue Yang, Ganesh Gopalakrishnan, Gary Lindstrom, K...
DBPL
2003
Springer
73views Database» more  DBPL 2003»
14 years 1 months ago
Updates and Incremental Validation of XML Documents
We consider the incremental validation of updates on XML documents. When a valid XML document (i.e., one satisfying some constraints) is updated, it has to be verified that the n...
Béatrice Bouchou, Mirian Halfeld Ferrari Al...
DSOM
2003
Springer
14 years 1 months ago
Visual-Based Anomaly Detection for BGP Origin AS Change (OASC) Events
Instead of relying completely on machine intelligence in anomaly event analysis and correlation, in this paper, we take one step back and investigate the possibility of a human-int...
Soon Tee Teoh, Kwan-Liu Ma, Shyhtsun Felix Wu, Dan...
GLVLSI
2010
IEEE
209views VLSI» more  GLVLSI 2010»
14 years 29 days ago
Enhancing debugging of multiple missing control errors in reversible logic
Researchers are looking for alternatives to overcome the upcoming limits of conventional hardware technologies. Reversible logic thereby established itself as a promising directio...
Jean Christoph Jung, Stefan Frehse, Robert Wille, ...
3DPVT
2002
IEEE
186views Visualization» more  3DPVT 2002»
14 years 25 days ago
A Gesture Recognition System Using 3D Data
In this paper a gesture recognition system using 3D data is described. The system relies on a novel 3D sensor that generates a dense range image of the scene. The main novelty of ...
Sotiris Malassiotis, Niki Aifanti, Michael G. Stri...