Sciweavers

533 search results - page 73 / 107
» Control flow based obfuscation
Sort
View
ITC
1999
IEEE
107views Hardware» more  ITC 1999»
15 years 6 months ago
A high-level BIST synthesis method based on a region-wise heuristic for an integer linear programming
A high-level built-in self-test (BIST) synthesis involves several tasks such as system register assignment, interconnection assignment, and BIST register assignment. Existing high...
Han Bin Kim, Dong Sam Ha
APN
2004
Springer
15 years 6 months ago
Web Supported Enactment of Petri-Net Based Workflows with XRL/Flower
This paper describes concepts and features of a Web-based system called XRL/flower for carrying out Petri-net based workflows described with XRL (eXchangeable Routing Language). XR...
Alexander Norta
ICSOC
2010
Springer
15 years 15 days ago
Automatic Fragment Identification in Workflows Based on Sharing Analysis
In Service-Oriented Computing (SOC), fragmentation and merging of workflows are motivated by a number of concerns, among which we can cite design issues, performance, and privacy. ...
Dragan Ivanovic, Manuel Carro, Manuel V. Hermenegi...
165
Voted
IHIS
2005
ACM
15 years 8 months ago
Verifying web services composition based on hierarchical colored petri nets
Current Web services composition proposals, such as BPML, BPEL, WSCI, and OWL-S, provide notations for describing the control and data flows in Web service collaborations. However...
Yanping Yang, QingPing Tan, Yong Xiao
LCN
2002
IEEE
15 years 7 months ago
Performance Analysis of Token-Based Fast TCP in Systems Supporting Large Windows
Since TCP can only detect congestion after packet losses have already happened, various forms of Fast TCP (FTCP) have been proposed to notify congestion early and avoid packet los...
Fei Peng, Victor C. M. Leung