Sciweavers

2766 search results - page 431 / 554
» Hybridizing a Logical Framework
Sort
View
120
Voted
ACNS
2008
Springer
132views Cryptology» more  ACNS 2008»
15 years 10 months ago
Analysis of EAP-GPSK Authentication Protocol
Abstract. The EAP-GPSK protocol is a lightweight, flexible authentication protocol relying on symmetric key cryptography. It is part of an ongoing IETF process to develop authenti...
John C. Mitchell, Arnab Roy, Paul Rowe, Andre Sced...
DATE
2007
IEEE
106views Hardware» more  DATE 2007»
15 years 10 months ago
Optimized integration of test compression and sharing for SOC testing
1 The increasing test data volume needed to test core-based System-on-Chip contributes to long test application times (TAT) and huge automatic test equipment (ATE) memory requireme...
Anders Larsson, Erik Larsson, Petru Eles, Zebo Pen...
ECBS
2007
IEEE
142views Hardware» more  ECBS 2007»
15 years 10 months ago
Model-Driven Engineering for Development-Time QoS Validation of Component-Based Software Systems
Model-driven engineering (MDE) techniques are increasingly being used to address many of the development and operational lifecycle concerns of large-scale component-based systems....
James H. Hill, Sumant Tambe, Aniruddha S. Gokhale
FBIT
2007
IEEE
15 years 10 months ago
Rough Set Based Information Retrieval from Argumentative Data Points in Weblogs
This paper describes a decision tree model and 3dimensional representation of information retrieved from various weblogs in relation to argumentative logics. The weblogs are consi...
Sea Woo Kim, Chin-Wan Chung
ICC
2007
IEEE
15 years 10 months ago
A Grammar for Specifying Usage Control Policies
—Usage control goes beyond traditional access control, addressing its limitations related to attribute mutability and continuous usage permission validation. The recently propose...
Rafael Teigao, Carlos Maziero, Altair Olivo Santin