Sciweavers

2432 search results - page 431 / 487
» Cryptographic logical relations
Sort
View
SSDBM
1999
IEEE
135views Database» more  SSDBM 1999»
15 years 8 months ago
Query Processing in the TAMBIS Bioinformatics Source Integration System
Conducting bioinformatic analyses involves biologists in expressing requests over a range of highly heterogeneous information sources and software tools. Such activities are labor...
Norman W. Paton, Robert Stevens, Patricia G. Baker...
FOSSACS
1998
Springer
15 years 8 months ago
Functor Categories and Two-Level Languages
Abstract. We propose a denotational semantics for the two-level language of [GJ91, Gom92], and prove its correctness w.r.t. a standard denotational semantics. Other researchers (se...
Eugenio Moggi
FPGA
1998
ACM
176views FPGA» more  FPGA 1998»
15 years 8 months ago
A Fast Routability-Driven Router for FPGAs
Three factors are driving the demand for rapid FPGA compilation. First, as FPGAs have grown in logic capacity, the compile computation has grown more quickly than the compute powe...
Jordan S. Swartz, Vaughn Betz, Jonathan Rose
149
Voted
ICTAI
1997
IEEE
15 years 8 months ago
Toward the Optimization of a Class of Black Box Optimization Algorithms
Many black box optimization algorithms have sufcient exibility to allow them to adapt to the varying circumstances they encounter. These capabilities are of two primary sorts: 1) ...
Gang Wang, Erik D. Goodman, William F. Punch III
INFOCOM
1997
IEEE
15 years 8 months ago
Analyzing Non-Determinism in Telecommunication Services Using P-Invariant of Petri-Net Model
The non-deterministic behaviors in telecommunication services are well-known as one of the most typical Feature Interactions, and they should be detected and eliminated from the t...
Masahide Nakamura, Yoshiaki Kakuda, Tohru Kikuno