Sciweavers

2290 search results - page 357 / 458
» Extensible Protected Types
Sort
View
111
Voted
NDSS
1997
IEEE
15 years 6 months ago
Hierarchical Organization of Certification Authorities for Secure Environments
This paper presents a model of hierarchical organization of Certification Authorities which can be applied to any open system network. In order to study the feasibility of the pro...
Lourdes López Santidrián, Justo Carr...
DAC
1997
ACM
15 years 6 months ago
System Level Fixed-Point Design Based on an Interpolative Approach
The design process for xed-point implementations either in software or in hardware requires a bit-true speci cation of the algorithm in order to analyze quantization e ects on an...
Markus Willems, Volker Bürsgens, Holger Kedin...
ADAEUROPE
1997
Springer
15 years 6 months ago
On Programming Atomic Actions in Ada 95
Abstract. This paper describes the development of two kinds of atomic action schemes for Ada 95. We start by discussing the basic features required of an atomic action scheme and w...
Alexander B. Romanovsky, Stuart E. Mitchell, Andy ...
CAISE
1997
Springer
15 years 6 months ago
Towards Method-Driven Trace Capture
Abstract: Traceability is a prerequisite for managing the evolution of (software) systems. Assuring overall traceability of a system development process, i.e., capturing and interr...
Klaus Pohl, Ralf Dömges, Matthias Jarke
124
Voted
ESA
1997
Springer
93views Algorithms» more  ESA 1997»
15 years 6 months ago
Quasi-Fully Dynamic Algorithms for Two-Connectivity, Cycle Equivalence and Related Problems
In thispaper we introduce a new class of dynamicgraphalgorithmscalledquasi-fully dynamic algorithms,which are much more general than the backtracking algorithmsand are much simple...
Madhukar R. Korupolu, Vijaya Ramachandran