Sciweavers

892 search results - page 79 / 179
» Action respecting embedding
Sort
View
98
Voted
ENTCS
2006
134views more  ENTCS 2006»
15 years 21 days ago
Anonymity in Probabilistic and Nondeterministic Systems
Anonymity means that the identity of the user performing a certain action is maintained secret. The protocols for ensuring anonymity often use random mechanisms which can be descr...
Catuscia Palamidessi
114
Voted
AIPS
2011
14 years 4 months ago
Planning and Acting in Incomplete Domains
Engineering complete planning domain descriptions is often very costly because of human error or lack of domain knowledge. Learning complete domain descriptions is also very chall...
Christopher Weber, Daniel Bryce
100
Voted
DATE
2003
IEEE
92views Hardware» more  DATE 2003»
15 years 6 months ago
An Integrated Approach for Improving Cache Behavior
The widening gap between processor and memory speeds renders data locality optimization a very important issue in data-intensive embedded applications. Throughout the years hardwa...
Gokhan Memik, Mahmut T. Kandemir, Alok N. Choudhar...
98
Voted
CORR
2010
Springer
75views Education» more  CORR 2010»
15 years 24 days ago
Linear Algebra in the vector space of intervals
In a previous paper, we have given an algebraic model to the set of intervals. Here, we apply this model in a linear frame. For example, we define a notion of diagonalization of s...
Nicolas Goze
106
Voted
ESSOS
2010
Springer
15 years 9 months ago
Automatic Generation of Smart, Security-Aware GUI Models
In many software applications, users access application data using graphical user interfaces (GUIs). There is an important, but little explored, link between visualization and secu...
David A. Basin, Manuel Clavel, Marina Egea, Michae...