Sciweavers

7167 search results - page 1194 / 1434
» Answer Set Programming
Sort
View
101
Voted
ICALP
2005
Springer
15 years 8 months ago
Completely Non-malleable Schemes
Abstract An encryption scheme is non-malleable if the adversary cannot transform a ciphertext into one of a related message under the given public key. Although providing a very st...
Marc Fischlin
ICSOC
2005
Springer
15 years 7 months ago
Pattern-Based Specification and Validation of Web Services Interaction Properties
There have been significant efforts in providing semantic descriptions for Web services, including the approach as exemplified by OWLS. Part of the semantic description in OWL-S is...
Zheng Li, Jun Han, Yan Jin
IPSN
2005
Springer
15 years 7 months ago
Telos: enabling ultra-low power wireless research
— We present Telos, an ultra low power wireless sensor module (“mote”) for research and experimentation. Telos is the latest in a line of motes developed by UC Berkeley to en...
Joseph Polastre, Robert Szewczyk, David E. Culler
MATES
2005
Springer
15 years 7 months ago
A Goal Deliberation Strategy for BDI Agent Systems
One aspect of rational behavior is that agents can pursue multiple goals in parallel. Current BDI theory and systems do not provide a theoretical or architectural framework for dec...
Alexander Pokahr, Lars Braubach, Winfried Lamersdo...
132
Voted
PCI
2005
Springer
15 years 7 months ago
Tuning Blocked Array Layouts to Exploit Memory Hierarchy in SMT Architectures
Cache misses form a major bottleneck for memory-intensive applications, due to the significant latency of main memory accesses. Loop tiling, in conjunction with other program tran...
Evangelia Athanasaki, Kornilios Kourtis, Nikos Ana...
« Prev « First page 1194 / 1434 Last » Next »