Sciweavers

1615 search results - page 57 / 323
» What's new
Sort
View
FMAM
2010
174views Formal Methods» more  FMAM 2010»
13 years 7 months ago
Are Formal Methods Ready for Agility? A Reality Check
Abstract: The integration of agile software development techniques with formal methods has attracted attention as a research topic. But what exactly is to be gained from attempting...
Peter Gorm Larsen, John S. Fitzgerald, Sune Wolff
JOLLI
2011
84views more  JOLLI 2011»
13 years 16 days ago
Semantically Restricted Argument Dependencies
This paper presents a new take on how argument dependencies in natural language are established and constrained. The paper starts with a rather standard view that (quantificationa...
Alastair Butler
VLSID
1999
IEEE
104views VLSI» more  VLSID 1999»
14 years 1 months ago
Interconnect Optimization Strategies for High-Performance VLSI Designs
Interconnect tuning and repeater insertion are necessary to optimize interconnectdelay, signalperformanceandintegrity, andinterconnectmanufacturability and reliability. Repeater i...
Andrew B. Kahng, Sudhakar Muddu, Egino Sarto
PERCOM
2005
ACM
14 years 9 months ago
Traditional Systems Can Work Well for Pervasive Applications. A Case Study: Plan 9 from Bell Labs Becomes Ubiquitous
There is a huge effort in ongoing research on new middleware platforms and new distributed services to support ubiquitous environments and pervasive applications. Most research pr...
Francisco J. Ballesteros, Gorka Guardiola Muzquiz,...
JCM
2008
74views more  JCM 2008»
13 years 9 months ago
Publicly Verifiable Secret Sharing Member-join Protocol For Threshold Signatures
Publicly verifiable secret sharing (PVSS) allows not only shareholders themselves but also everyone verify the shares of a secret distributed by a dealer. It has a lot of electroni...
Jia Yu, Fanyu Kong, Rong Hao, Xuliang Li, Guowen L...