Sciweavers

5255 search results - page 944 / 1051
» Formal Methods for Privacy
Sort
View
DAC
1995
ACM
15 years 6 months ago
Hierarchical Optimization of Asynchronous Circuits
Abstract— Many asynchronous designs are naturally specified and implemented hierarchically as an interconnection of separate asynchronous modules that operate concurrently and c...
Bill Lin, Gjalt G. de Jong, Tilman Kolks
ICTAI
1997
IEEE
15 years 6 months ago
GA-Based Performance Analysis of Network Protocols
This paper tackles the problem of analyzing the correctness and performance of a computer network protocol. Given the complexity of the problem, no currently used technique is abl...
Mario Baldi, Fulvio Corno, Maurizio Rebaudengo, Gi...
108
Voted
ICAIL
1995
ACM
15 years 6 months ago
Automated Legislative Drafting: Generating Paraphrases of Legislation
In this paper, we describe which roles deep structures of law play in (automatic) drafting legislation. Deep structures contain a formal description of the intended normative effe...
Radboud Winkels, Nienke den Haan
137
Voted
ICCV
1995
IEEE
15 years 6 months ago
FORMS: A Flexible Object Recognition and Modelling System
Abstract. We describe a flexible object recognition and modelling system (FORMS) which represents and recognizes animate objects from their silhouettes. This consists of a model fo...
Song Chun Zhu, Alan L. Yuille
WCRE
1997
IEEE
15 years 6 months ago
Reverse Engineering is Reverse Forward Engineering
Reverse Engineering is focused on the challenging task of understanding legacy program code without having suitable documentation. Using a transformational forward engineering per...
Ira D. Baxter, Michael Mehlich