Sciweavers

3172 search results - page 513 / 635
» New developments of the Z-EDM algorithm
Sort
View
EUC
2006
Springer
13 years 12 months ago
DiCa: Distributed Tag Access with Collision-Avoidance Among Mobile RFID Readers
Abstract. Advances in wireless and mobile communication technologies have enabled the development of various RFID-based systems and applications in addition to the extension of the...
Kwang-il Hwang, Kyung Tae Kim, Doo Seop Eom
CHARME
2003
Springer
97views Hardware» more  CHARME 2003»
13 years 12 months ago
Coverage Metrics for Formal Verification
In formal verification, we verify that a system is correct with respect to a specification. Even when the system is proven to be correct, there is still a question of how complete ...
Hana Chockler, Orna Kupferman, Moshe Y. Vardi
FOSAD
2000
Springer
13 years 11 months ago
Security Goals: Packet Trajectories and Strand Spaces
This material was presented in a series of lectures at fosad, a summer school on Foundations of Security Analysis and Design, at the University of Bologna Center at Bertinoro in Se...
Joshua D. Guttman
APSEC
1995
IEEE
13 years 11 months ago
An Efficient Debugging Method for Message-based Parallel Programs using Static Analysis Information
Guaranteeiq reproducibility and minimizing probe effects are major issues in the parallel program debugging. This paper suggests a new debugging method, named Detect and Reproduce...
Hyun Seop Bae, Yong Rae Kwon, Hyeon Soo Kim
CHI
1995
ACM
13 years 11 months ago
Finding and Using Implicit Structure in Human-Organized Spatial Layouts of Information
Many interfaces allow users to manipulate graphical objects, icons representing underlying data or the data themselves, against a spatial backdrop or canvas. Users take advantage ...
Frank M. Shipman III, Catherine C. Marshall, Thoma...