Sciweavers

882 search results - page 121 / 177
» On the Hardness of Graph Isomorphism
Sort
View
CISIS
2009
IEEE
14 years 3 months ago
A Parameter-Based Scheme for Service Composition in Pervasive Computing Environment
Pervasive computing, the new computing paradigm aiming at providing services anywhere at anytime, poses great challenges on dynamic service composition. Existing service compositi...
Zhenghui Wang, Tianyin Xu, Zhuzhong Qian, Sanglu L...
ECBS
2008
IEEE
86views Hardware» more  ECBS 2008»
14 years 3 months ago
A Formal Model for Network-Wide Security Analysis
Network designers perform challenging tasks with so many configuration options that it is often hard or even impossible for a human to predict all potentially dangerous situation...
Petr Matousek, Jaroslav Ráb, Ondrej Rysavy,...
GLVLSI
2006
IEEE
115views VLSI» more  GLVLSI 2006»
14 years 2 months ago
Yield enhancement of asynchronous logic circuits through 3-dimensional integration technology
This paper presents a systematic design methodology for yield enhancement of asynchronous logic circuits using 3-D (3-Dimensional) integration technology. In this design, the targ...
Song Peng, Rajit Manohar
ACSAC
2005
IEEE
14 years 2 months ago
Code Security Analysis of a Biometric Authentication System Using Automated Theorem Provers
Understanding the security goals provided by cryptographic protocol implementations is known to be difficult, since security requirements such as secrecy, integrity and authentici...
Jan Jürjens
FPL
1999
Springer
103views Hardware» more  FPL 1999»
14 years 1 months ago
IP Validation for FPGAs Using Hardware Object Technology
Although verification and simulation tools are always improving, the results they provide remain hard to analyze and interpret. On one hand, verification sticks to the functional ...
Steve Casselman, John Schewel, Christophe Beaumont