Sciweavers

2291 search results - page 269 / 459
» Representational Reasoning and Verification
Sort
View
ACSAC
2003
IEEE
14 years 4 months ago
An Editor for Adaptive XML-Based Policy Management of IPsec
The IPsec protocol provides a mechanism to enforce a range of security services for both confidentiality and integrity, enabling secure transmission of information across networks...
Raj Mohan, Timothy E. Levin, Cynthia E. Irvine
MM
2009
ACM
249views Multimedia» more  MM 2009»
14 years 3 months ago
MyFinder: near-duplicate detection for large image collections
The explosive growth of multimedia data poses serious challenges to data storage, management and search. Efficient near-duplicate detection is one of the required technologies for...
Xin Yang, Qiang Zhu, Kwang-Ting Cheng
BPM
2009
Springer
126views Business» more  BPM 2009»
14 years 3 months ago
An Integrated Collection of Tools for Continuously Improving the Processes by Which Health Care Is Delivered: A Tool Report
This report will present a collection of tools that supports the precise definition, careful analysis, and execution of processes that coordinate the actions of humans, automated d...
Leon J. Osterweil, Lori A. Clarke, George S. Avrun...
ICCAD
2000
IEEE
88views Hardware» more  ICCAD 2000»
14 years 3 months ago
Hierarchical Interconnect Circuit Models
The increasing size of integrated systems combined with deep submicron physical modeling details creates an explosion in RLC interconnect modeling complexity of unmanageable propo...
Michael W. Beattie, Satrajit Gupta, Lawrence T. Pi...
CAV
2006
Springer
116views Hardware» more  CAV 2006»
14 years 2 months ago
Lazy Shape Analysis
Abstract. Many software model checkers are based on predicate abstraction. If the verification goal depends on pointer structures, the approach does not work well, because it is di...
Dirk Beyer, Thomas A. Henzinger, Grégory Th...