Sciweavers

631 search results - page 89 / 127
» Deriving Specifications from Requirements: An Example
Sort
View
ACSAC
2003
IEEE
14 years 21 days ago
An Intrusion-Tolerant Password Authentication System
In a password-based authentication system, to authenticate a user, a server typically stores password verification data (PVD), which is a value derived from the user’s password...
Xunhua Wang, Mohammad Hossain Heydari, Hua Lin
ICSM
1997
IEEE
13 years 11 months ago
Reverse Architecting Approach for Complex Systems
Philips is an electronics company which operates world wide and participates in professional as well as consumer markets. The architecture of many software intensive systems are c...
René L. Krikhaar
ICCAD
1995
IEEE
97views Hardware» more  ICCAD 1995»
13 years 11 months ago
Interface co-synthesis techniques for embedded systems
A key aspect of the synthesis of embedded systems is the automatic integration of system components. This entails the derivation of both the hardware and software interfaces that ...
Pai H. Chou, Ross B. Ortega, Gaetano Borriello

Publication
319views
12 years 5 months ago
 Viability Evolution: Elimination and Extinction in Evolutionary Computation
Current mainstream Evolutionary Algorithms (EA) are based on the concept of selection, encapsulated in the definition of a fitness function. Besides selection, however, the natur...
Claudio Mattiussi
POPL
2010
ACM
14 years 4 months ago
Semantics and Algorithms for Data-dependent Grammars
Traditional parser generation technologies are incapable of handling the demands of modern programmers. In this paper, we present the design and theory of a new parsing engine, YA...
Yitzhak Mandelbaum, Trevor Jim, David Walker