Sciweavers

2432 search results - page 430 / 487
» Cryptographic logical relations
Sort
View
APSEC
2000
IEEE
15 years 8 months ago
Fuzzy concepts and formal methods: some illustrative examples
It has been recognised that formal methods are useful as a modelling tool in requirements engineering. Specification languages such as Z permit the precise and unambiguous modell...
Chris Matthews, Paul A. Swatman
DATE
2000
IEEE
136views Hardware» more  DATE 2000»
15 years 8 months ago
On Applying Incremental Satisfiability to Delay Fault Testing
The Boolean satisfiability problem (SAT) has various applications in electronic design automation (EDA) fields such as testing, timing analysis and logic verification. SAT has bee...
Joonyoung Kim, Jesse Whittemore, Karem A. Sakallah...
ICDAR
1999
IEEE
15 years 8 months ago
Preattentive Reading and Selective Attention for Document Image Analysis
PixED (from Pixel to Electronic Document) is aimed at converting document images into structured electronic documents which can be read by a machine for information retrieval. The...
Claudie Faure
IPPS
1999
IEEE
15 years 8 months ago
Marshaling/Demarshaling as a Compilation/Interpretation Process
Marshaling is the process through which structured values are serialized into a stream of bytes; demarshaling converts this stream of bytes back to structured values. Most often, ...
Christian Queinnec
108
Voted
ISCA
1999
IEEE
87views Hardware» more  ISCA 1999»
15 years 8 months ago
Dynamic Vectorization: A Mechanism for Exploiting Far-Flung ILP in Ordinary Programs
Several ILP limit studies indicate the presence of considerable ILP across dynamically far-apart instructions in program execution. This paper proposes a hardware mechanism, dynam...
Sriram Vajapeyam, P. J. Joseph, Tulika Mitra