Sciweavers

1415 search results - page 199 / 283
» Verified systems by composition from verified components
Sort
View
SSWMC
2004
13 years 10 months ago
Security for biometric data
Biometric authentication, i.e. verifying the claimed identity of a person based on physiological characteristics or behavioral traits, has the potential to contribute to both priv...
Claus Vielhauer, Ton Kalker
PDPTA
2003
13 years 10 months ago
Quaternary Arithmetic Logic Unit on a Programmable Logic Device
Common binary arithmetic operations such as addition/subtraction and multiplication suffer from O(n) carry propagation delay where n is the number of digits. Carry lookahead helps...
Songpol Ongwattanakul, Phaisit Chewputtanagul, Dav...
FIW
2009
163views Communications» more  FIW 2009»
13 years 6 months ago
Detecting policy conflicts by model checking UML state machines
Policies are convenient means to modify system behaviour at run-time. Nowadays, policies are created in great numbers by different actors, ranging from system administrators to lay...
Maurice H. ter Beek, Stefania Gnesi, Carlo Montang...
DSVIS
2005
Springer
14 years 2 months ago
Goal-Oriented Design of Domain Control Panels
Goal-oriented methodologies have demonstrated some adequacy for modelling composite systems, from high level desired properties to operational requirements on responsible agents. T...
Christophe Ponsard, Nadiya Balych, Philippe Masson...
AIEDAM
2008
106views more  AIEDAM 2008»
13 years 9 months ago
Analogical recognition of shape and structure in design drawings
We describe a method for constructing a structural model of an unlabeled target two-dimensional line drawing by analogy to a known source model of a drawing with similar structure...
Patrick W. Yaner, Ashok K. Goel