Sciweavers

5544 search results - page 82 / 1109
» Three Inadequate Models
Sort
View
ANSS
2003
IEEE
14 years 1 months ago
Internode: Internal Node Logic Computational Model
In this work, we present a computational behavioral model for logic gates called Internode (Internal Node Logic Computational Model) that considers the functionality of the gate a...
Alejandro Millán, Manuel J. Bellido, Jorge ...
DATE
2003
IEEE
91views Hardware» more  DATE 2003»
14 years 1 months ago
Fast and Accurate Multiprocessor Architecture Exploration with Symbolic Programs
In system-level platform-based embedded systems design, the mapping model is a crucial link between the application model and the architecture model. All three models must match w...
Vladimir D. Zivkovic, Erwin A. de Kock, Pieter van...
EUROPKI
2009
Springer
13 years 5 months ago
Validity Models of Electronic Signatures and Their Enforcement in Practice
Abstract. An electronic signature is considered to be valid, if the signature is mathematically correct and if the signer's public key is classified as authentic. While the fi...
Harald Baier, Vangelis Karatsiolis
CCS
2006
ACM
13 years 11 months ago
Secure information sharing enabled by Trusted Computing and PEI models
The central goal of secure information sharing is to "share but protect" where the motivation to "protect" is to safeguard the sensitive content from unauthori...
Ravi S. Sandhu, Kumar Ranganathan, Xinwen Zhang
CONSTRAINTS
2010
101views more  CONSTRAINTS 2010»
13 years 7 months ago
Constraint models for graceful graphs
Abstract. We present three constraint models of the problem of finding a graceful labelling of a graph, or proving that the graph is not graceful. An experimental comparison of the...
Barbara M. Smith, Jean-François Puget