Sciweavers

3256 search results - page 517 / 652
» Applications of Formal Methods to System Design and Verifica...
Sort
View
AAAI
2010
14 years 11 months ago
How Incomplete Is Your Semantic Web Reasoner?
Conjunctive query answering is a key reasoning service for many ontology-based applications. In order to improve scalability, many Semantic Web query answering systems give up com...
Giorgos Stoilos, Bernardo Cuenca Grau, Ian Horrock...
DAC
2009
ACM
15 years 4 months ago
Endosymbiotic computing: enabling surrogate GUI and cyber-physical connectivity
Endosymbiotic Computing entails attaching an RF-enabled microcontroller module (endomodule) to an appliance such that it appears as a networked device in the cyber world. It enabl...
Pai H. Chou
ICIC
2005
Springer
15 years 3 months ago
An Intelligent Assistant for Public Transport Management
This paper describes the architecture of a computer system conceived as an intelligent assistant for public transport management. The goal of the system is to help operators of a c...
Martín Molina
CASES
2003
ACM
15 years 3 months ago
Frequent loop detection using efficient non-intrusive on-chip hardware
Dynamic software optimization methods are becoming increasingly popular for improving software performance and power. The first step in dynamic optimization consists of detecting ...
Ann Gordon-Ross, Frank Vahid
CRYPTO
2011
Springer
180views Cryptology» more  CRYPTO 2011»
13 years 9 months ago
Leakage-Resilient Zero Knowledge
In this paper, we initiate a study of zero knowledge proof systems in the presence of sidechannel attacks. Specifically, we consider a setting where a cheating verifier is allow...
Sanjam Garg, Abhishek Jain 0002, Amit Sahai