Sciweavers

3820 search results - page 140 / 764
» Bounded Model Debugging
Sort
View
104
Voted
SIGECOM
2006
ACM
88views ECommerce» more  SIGECOM 2006»
15 years 8 months ago
Implementation with a bounded action space
While traditional mechanism design typically assumes isomorphism between the agents’ type- and action spaces, in many situations the agents face strict restrictions on their act...
Liad Blumrosen, Michal Feldman
113
Voted
FDTC
2006
Springer
102views Cryptology» more  FDTC 2006»
15 years 6 months ago
Cryptographic Key Reliable Lifetimes: Bounding the Risk of Key Exposure in the Presence of Faults
With physical attacks threatening the security of current cryptographic schemes, no security policy can be developed without taking into account the physical nature of computation....
Alfonso De Gregorio
132
Voted
DAC
1995
ACM
15 years 6 months ago
On the Bounded-Skew Clock and Steiner Routing Problems
We study the minimum-costbounded-skewrouting tree (BST) problem under the linear delay model. This problem captures several engineering tradeoffs in the design of routing topologi...
Dennis J.-H. Huang, Andrew B. Kahng, Chung-Wen Alb...
117
Voted
FORTE
2001
15 years 4 months ago
A Family of Resource-Bound Real-Time Process Algebras
The Algebra of Communicating Shared Resources (ACSR) is a timed process algebra which extends classical process algebras with the notion of a resource. It takes the view that the ...
Insup Lee, Jin-Young Choi, Hee-Hwan Kwak, Anna Phi...
140
Voted
TMI
2008
108views more  TMI 2008»
15 years 2 months ago
Estimation and Statistical Bounds for Three-Dimensional Polar Shapes in Diffuse Optical Tomography
Abstract--Voxel-based reconstructions in diffuse optical tomography (DOT) using a quadratic regularization functional tend to produce very smooth images due to the attenuation of h...
Gregory Boverman, Eric L. Miller, Dana H. Brooks, ...