可重用本体模块的抽取是本体重用的一个关键环节。与传统工程应用中使用的基于本体层次的结构化方法抽取本体模块相比,使用逻辑的方法能充分利用本体提供的语义信息,抽取的本体模块更具完整性和正确性。在研究保守扩展的本体模块理论基...可重用本体模块的抽取是本体重用的一个关键环节。与传统工程应用中使用的基于本体层次的结构化方法抽取本体模块相比,使用逻辑的方法能充分利用本体提供的语义信息,抽取的本体模块更具完整性和正确性。在研究保守扩展的本体模块理论基础上,根据Grau B C提出的S HOJQ本地性规则,提出并证明了描述逻辑S HJF对应的语义本地性规则和句法本地性规则,为基于该规则抽取可重用本体模块提供了理论基础。展开更多
Intellectual Property (IP) reuse methodology has been widely used in Integrate Circuit (IC) design. Meanwhile, the corresponding security problems caused by illegal IP distribution have aroused lots of attentions....Intellectual Property (IP) reuse methodology has been widely used in Integrate Circuit (IC) design. Meanwhile, the corresponding security problems caused by illegal IP distribution have aroused lots of attentions. Unlike using IP watermark to identify IP's ownership, IP fingerprinting can be used to trace illegal distributor. In this paper, IP buyer's fingerprint is mapped into different derived instances of extracted modules, and then is embedded into IP to identify distributor in case of illegal distribution. Comparing with other fingerprinting method, the proposed method has some good characteristics such as low design effort, small storage demand, high security and few physical overheads.展开更多
文摘可重用本体模块的抽取是本体重用的一个关键环节。与传统工程应用中使用的基于本体层次的结构化方法抽取本体模块相比,使用逻辑的方法能充分利用本体提供的语义信息,抽取的本体模块更具完整性和正确性。在研究保守扩展的本体模块理论基础上,根据Grau B C提出的S HOJQ本地性规则,提出并证明了描述逻辑S HJF对应的语义本地性规则和句法本地性规则,为基于该规则抽取可重用本体模块提供了理论基础。
基金Supported by the National Defense Basic ScientificResearch of China (C2720061361)
文摘Intellectual Property (IP) reuse methodology has been widely used in Integrate Circuit (IC) design. Meanwhile, the corresponding security problems caused by illegal IP distribution have aroused lots of attentions. Unlike using IP watermark to identify IP's ownership, IP fingerprinting can be used to trace illegal distributor. In this paper, IP buyer's fingerprint is mapped into different derived instances of extracted modules, and then is embedded into IP to identify distributor in case of illegal distribution. Comparing with other fingerprinting method, the proposed method has some good characteristics such as low design effort, small storage demand, high security and few physical overheads.