-
1
-
-
0030246260
-
Improving the variable ordering of OBDDs is NP-complete
-
Sept.
-
Beate Bollig and Ingo Wegener. Improving the variable ordering of OBDDs is NP-complete. IEEE Trans. on Computers, 45(9):993-1001, Sept. 1996.
-
(1996)
IEEE Trans. on Computers
, vol.45
, Issue.9
, pp. 993-1001
-
-
Bollig, B.1
Wegener, I.2
-
2
-
-
84949223915
-
A component-based architecture for secure data publication
-
New Orleans, LA, December
-
Piero Bonatti, Ernesto Damiani, and Pierangela Samarati. A component-based architecture for secure data publication. In Proceedings of 17th Annual Computer Security Applications Conference (ACSAC), pages 309-318, New Orleans, LA, December 2001.
-
(2001)
Proceedings of 17th Annual Computer Security Applications Conference (ACSAC)
, pp. 309-318
-
-
Bonatti, P.1
Damiani, E.2
Samarati, P.3
-
3
-
-
0036311802
-
A uniform framework for regulating service access and information release on the web
-
Piero A. Bonatti and Pierangela Samarati. A uniform framework for regulating service access and information release on the Web. Journal of Computer Security, 10(3):241-271, 2002.
-
(2002)
Journal of Computer Security
, vol.10
, Issue.3
, pp. 241-271
-
-
Bonatti, P.A.1
Samarati, P.2
-
4
-
-
0026175133
-
Heuristics to compute variable orderings for efficient manipulation of ordered binary decision diagrams
-
San Francisco, CA, June
-
Kenneth M. Butler, Don E. Ross, Rohit Kapur, and M.Ray Mercer. Heuristics to compute variable orderings for efficient manipulation of ordered binary decision diagrams. In Proceedings of the 28th conference on ACM/IEEE Design Automation, pages 417-420, San Francisco, CA, June 1991.
-
(1991)
Proceedings of the 28th Conference on ACM/IEEE Design Automation
, pp. 417-420
-
-
Butler, K.M.1
Ross, D.E.2
Kapur, R.3
Mercer, M.R.4
-
7
-
-
0027047925
-
On variable ordering of binary decision diagrams for the application of multi-level logic synthesis
-
Amsterdam, February. IEEE Computer Society Press
-
Masahiro Fujita, Yusuke Matsunaga, and Taeko Kakuda. On variable ordering of binary decision diagrams for the application of multi-level logic synthesis. In Proceedings of the conference on European Design Automation, pages 50-54, Amsterdam, February 1991. IEEE Computer Society Press.
-
(1991)
Proceedings of the Conference on European Design Automation
, pp. 50-54
-
-
Fujita, M.1
Matsunaga, Y.2
Kakuda, T.3
-
9
-
-
84958059004
-
Exponential lower bounds on the size of OBDDs representing integer divistion
-
Takashi Horiyama and Shuzo Yajima. Exponential lower bounds on the size of OBDDs representing integer divistion. In Proceedings ISAAC, pages 163-172, 1997.
-
(1997)
Proceedings ISAAC
, pp. 163-172
-
-
Horiyama, T.1
Yajima, S.2
-
10
-
-
33845622734
-
The interactive workspaces project: Experiences with ubiquitous computing environments
-
Apr-Jun
-
Brad Johanson, Armando Fox, and Terry Winograd. The Interactive Workspaces project: Experiences with ubiquitous computing environments. IEEE Pervasive Computing magazine, 1(2):67-74, Apr-Jun 2002.
-
(2002)
IEEE Pervasive Computing Magazine
, vol.1
, Issue.2
, pp. 67-74
-
-
Johanson, B.1
Fox, A.2
Winograd, T.3
-
11
-
-
14844301984
-
Search techniques
-
Hossein Bidgoli, editor. Academic Press, San Diego, CA, aug
-
R.E. Korf. Search techniques. In Hossein Bidgoli, editor, Encyclopedia of Information Systems. Academic Press, San Diego, CA, aug 2002.
-
(2002)
Encyclopedia of Information Systems
-
-
Korf, R.E.1
-
12
-
-
35048859338
-
Protecting security policies in ubiquitous environments using one-way functions
-
D.Hutter et al., editors, Security in Pervasive Computing 2003. Springer-Verlag, Heidelberg
-
Håkan Kvarnström, Hans Hedbom, and Erland Jonsson. Protecting security policies in ubiquitous environments using one-way functions. In D.Hutter et al., editors, Security in Pervasive Computing 2003, volume 2802 of LNCS, pages 71-85. Springer-Verlag, Heidelberg, 2003.
-
(2003)
LNCS
, vol.2802
, pp. 71-85
-
-
Kvarnström, H.1
Hedbom, H.2
Jonsson, E.3
-
13
-
-
0038220797
-
BuDDy - A binary decision diagram package
-
Technical University of Denmark
-
J. Lind-Nielsen. BuDDy - a binary decision diagram package. Technical Report IT-TR: 1999-028, Technical University of Denmark, 1999.
-
(1999)
Technical Report IT-TR: 1999-028
-
-
Lind-Nielsen, J.1
-
14
-
-
0003498073
-
On approximation preserving reductions: Complete problems and robust measures
-
University of Helsinki, Dept. of Computer Science
-
P. Orponen and H. Mannila. On approximation preserving reductions: Complete problems and robust measures. Technical Report C-1987-28, University of Helsinki, Dept. of Computer Science, 1987.
-
(1987)
Technical Report
, vol.C-1987-28
-
-
Orponen, P.1
Mannila, H.2
-
16
-
-
0022769976
-
Graph-based algorithms for boolean function manipulation
-
R.E.Bryant. Graph-based algorithms for boolean function manipulation. IEEE Transactions on Computers, C-35(8):677-691, 1986.
-
(1986)
IEEE Transactions on Computers
, vol.C-35
, Issue.8
, pp. 677-691
-
-
Bryant, R.E.1
-
17
-
-
33845645782
-
GaiaOS: A middleware infrastructure to enable Active Spaces
-
Oct-Dec
-
Manuel Roman, Christopher K. Hess, Renato Cerqueira, Anand Ranganathan, Roy H. Campbell, and Klara Nahrstedt. GaiaOS: A middleware infrastructure to enable Active Spaces. IEEE Pervasive Computing, pages 74-83, Oct-Dec 2002.
-
(2002)
IEEE Pervasive Computing
, pp. 74-83
-
-
Roman, M.1
Hess, C.K.2
Cerqueira, R.3
Ranganathan, A.4
Campbell, R.H.5
Nahrstedt, K.6
-
18
-
-
0016555241
-
The protection of information in computer systems
-
September
-
Jerome H. Saltzer and Michael D. Schroeder. The protection of information in computer systems. In Proceedings of the IEEE, volume 63, pages 1278-1308, September 1975.
-
(1975)
Proceedings of the IEEE
, vol.63
, pp. 1278-1308
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
19
-
-
84948983013
-
Access control for active spaces
-
Las Vegas, NV, December
-
Geetanjali Sampemane, Prasad Naldurg, and Roy H. Campbell. Access control for Active Spaces. In Proceedings of the Annual Computer Security Applications Conference (ACSAC), pages 343-352, Las Vegas, NV, December 2002.
-
(2002)
Proceedings of the Annual Computer Security Applications Conference (ACSAC)
, pp. 343-352
-
-
Sampemane, G.1
Naldurg, P.2
Campbell, R.H.3
-
20
-
-
0001853125
-
The computer for the 21st century
-
September
-
Mark Weiser. The computer for the 21st century. Scientific American, pages 94-104, September 1991.
-
(1991)
Scientific American
, pp. 94-104
-
-
Weiser, M.1
-
24
-
-
1642327001
-
Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
-
Ting Yu, Marianne Winslett, and Kent E. Seamons. Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Trans. Inf. Syst. Secur., 6(1):l-42, 2003.
-
(2003)
ACM Trans. Inf. Syst. Secur.
, vol.6
, Issue.1
-
-
Yu, T.1
Winslett, M.2
Seamons, K.E.3
-
25
-
-
0038200710
-
Learning-assisted automated planning
-
Terry Zimmerman and Subbarao Kambhampati. Learning-assisted automated planning. AI Magazine, 24(2):73-96, 2003.
-
(2003)
AI Magazine
, vol.24
, Issue.2
, pp. 73-96
-
-
Zimmerman, T.1
Kambhampati, S.2
|