Sciweavers

2421 search results - page 381 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
CCS
2003
ACM
14 years 3 months ago
Incentive-based modeling and inference of attacker intent, objectives, and strategies
Although the ability to model and infer Attacker Intent, Objectives and Strategies (AIOS) may dramatically advance the literature of risk assessment, harm prediction, and predicti...
Peng Liu, Wanyu Zang
FROCOS
2007
Springer
14 years 1 months ago
From KSAT to Delayed Theory Combination: Exploiting DPLL Outside the SAT Domain
In the last two decades we have witnessed an impressive advance in the efficiency of propositional satisfiability techniques (SAT), which has brought large and previously-intractab...
Roberto Sebastiani
CASES
2006
ACM
14 years 1 months ago
Incremental elaboration for run-time reconfigurable hardware designs
We present a new technique for compiling run-time reconfigurable hardware designs. Run-time reconfigurable embedded systems can deliver promising benefits over implementations in ...
Arran Derbyshire, Tobias Becker, Wayne Luk
APCCM
2009
13 years 11 months ago
Multi-Level Domain Modeling with M-Objects and M-Relationships
Using traditional semantic data modeling, multi-level modeling can be achieved by representing objects in different abstraction hierarchies, namely classification, aggregation and...
Bernd Neumayr, Katharina Grün, Michael Schref...
DEXAW
2010
IEEE
181views Database» more  DEXAW 2010»
13 years 11 months ago
Bridging the Gap between Heterogeneous and Semantically Diverse Content of Different Disciplines
The Web has been flooded with highly heterogeneous data sources that freely offer their data to the public. Careful design and compliance to standards is a way to cope with the he...
Siarhei Bykau, Nadzeya Kiyavitskaya, Chrisa Tsinar...