Sciweavers

2517 search results - page 16 / 504
» Specifying Weak Sets
Sort
View
SP
2003
IEEE
121views Security Privacy» more  SP 2003»
14 years 20 days ago
Specifying and Verifying Hardware for Tamper-Resistant Software
We specify a hardware architecture that supports tamper-resistant software by identifying an “idealized” hich gives the abstracted actions available to a single user program. ...
David Lie, John C. Mitchell, Chandramohan A. Thekk...
ICSOC
2003
Springer
14 years 18 days ago
PANDA: Specifying Policies for Automated Negotiations of Service Contracts
Abstract. The Web and Grid services frameworks provide a promising infrastructure for cross-organizational use of online services. The use of services in large-scale and cross-orga...
Henner Gimpel, Heiko Ludwig, Asit Dan, Robert Kear...
CA
2002
IEEE
14 years 11 days ago
Specifying MPEG-4 Body Behaviors
The MPEG-4 standard specifies a set of low-level animation parameters for body animation, but does not provide any high-level functionality for the control of avatars or embodied...
Anthony Guye-Vuillème, Daniel Thalmann
ITC
1998
IEEE
114views Hardware» more  ITC 1998»
13 years 11 months ago
BETSY: synthesizing circuits for a specified BIST environment
This paper presents a logic synthesis tool called BETSY (BIST Environment Testable Synthesis) for synthesizing circuits that achieve complete (100%)fault coverage in a user specif...
Zhe Zhao, Bahram Pouya, Nur A. Touba
KR
1998
Springer
13 years 11 months ago
Specifying Transactions for Extended Abduction
Extended abduction introduced by Inoue and Sakama (1995) generalizes traditional abduction in the sense that it can compute negative explanations by removing hypotheses from a non...
Katsumi Inoue, Chiaki Sakama