Sciweavers

1007 search results - page 96 / 202
» The Complexity of Futile Questioning
Sort
View
122
Voted
APSEC
1997
IEEE
15 years 7 months ago
Legacy Systems Migration : A Method and its Tool-Kit Framework
The problems posed by mission-critical legacy systems - brittleness, inflexibility, isolation, non-extensibility, lack of openness etc. - are well known, but practical solutions h...
Bing Wu, Deirdre Lawless, Jesus Bisbal, Jane Grims...
129
Voted
ICALP
1998
Springer
15 years 7 months ago
Bridges for Concatenation Hierarchies
In the seventies, several classification schemes for the rational languages were proposed, based on the alternate use of certain operators (union, complementation, product and star...
Jean-Eric Pin
118
Voted
DAC
1996
ACM
15 years 7 months ago
RTL Emulation: The Next Leap in System Verification
ion. Production use of text-based methodology has enabled designers to capture designs of hundreds of thousands of gates using graphic ESDA tools. Source: Data Quest (Verilog/VHDL ...
Sanjay Sawant, Paul Giordano
123
Voted
CSFW
1994
IEEE
15 years 7 months ago
One-Representative Safety Analysis in the Non-Monotonic Transform Model
We analyze the safety question for the Non-Monotonic Transform NMT model, an access control model that encompasses a wide variety of practical access control mechanisms. In genera...
Ravi S. Sandhu, Paul Ammann
214
Voted
COLT
1992
Springer
15 years 7 months ago
On the Computational Power of Neural Nets
This paper deals with finite size networks which consist of interconnections of synchronously evolving processors. Each processor updates its state by applying a "sigmoidal&q...
Hava T. Siegelmann, Eduardo D. Sontag