Sciweavers

179 search results - page 28 / 36
» The Three Dimensional Logic Engine
Sort
View
FOSSACS
2009
Springer
14 years 1 months ago
Cryptographic Protocol Composition via the Authentication Tests
Although cryptographic protocols are typically analyzed in isolation, they are used in combinations. If a protocol was analyzed alone and shown to meet some security goals, will it...
Joshua D. Guttman
IOLTS
2009
IEEE
231views Hardware» more  IOLTS 2009»
14 years 1 months ago
Designing fault tolerant FSM by nano-PLA
— The paper deals with designing fault tolerant finite state machines (FSMs) by nanoelectronic programmable logic arrays (PLAs). Two main critical parameters of the fault toleran...
Samary Baranov, Ilya Levin, Osnat Keren, Mark G. K...
IRI
2008
IEEE
14 years 1 months ago
Data component based management of reservoir simulation models
The management of reservoir simulation models has been an important need of engineers in petroleum industry. However, due to data sharing among reservoir simulation models, data r...
Cong Zhang, Amol Bakshi, Viktor K. Prasanna
TABLEAUX
1998
Springer
13 years 11 months ago
Model Checking: Historical Perspective and Example (Extended Abstract)
ple (Extended Abstract) Edmund M. Clarke and Sergey Berezin Carnegie Mellon University -- USA Model checking is an automatic verification technique for finite state concurrent syst...
Edmund M. Clarke, Sergey Berezin
FLAIRS
2007
13 years 9 months ago
Autonomous Classification of Knowledge into an Ontology
Ontologies are an increasingly important tool in knowledge representation, as they allow large amounts of data to be related in a logical fashion. Current research is concentrated...
Matthew E. Taylor, Cynthia Matuszek, Bryan Klimt, ...