Sciweavers

906 search results - page 135 / 182
» Chain Dominated Orders
Sort
View
ICCD
2001
IEEE
119views Hardware» more  ICCD 2001»
15 years 8 months ago
A Functional Validation Technique: Biased-Random Simulation Guided by Observability-Based Coverage
We present a simulation-based semi-formal verification method for sequential circuits described at the registertransfer level. The method consists of an iterative loop where cove...
Serdar Tasiran, Farzan Fallah, David G. Chinnery, ...
HICSS
2010
IEEE
154views Biometrics» more  HICSS 2010»
15 years 6 months ago
Towards an Understanding of Social Software: The Case of Arinia
This paper presents the case of Arinia, a custommade piece of social software with strong similarities to today’s microblogging applications. Arinia has been in use in a medium-...
Stuart J. Barnes, Martin Böhringer, Christian...
SAC
2010
ACM
15 years 6 months ago
Fast, flexible, and highly resilient genuine fifo and causal multicast algorithms
We study the fifo and causal multicast problem, two group-communication abstractions that deliver messages in an order consistent with their context. With fifo multicast, the co...
Nicolas Schiper, Fernando Pedone
CSFW
2009
IEEE
15 years 6 months ago
Minimal Message Complexity of Asynchronous Multi-party Contract Signing
Multi-party contract signing protocols specify how a number of signers can cooperate in achieving a fully signed contract, even in the presence of dishonest signers. This problem h...
Sjouke Mauw, Sasa Radomirovic, Mohammad Torabi Das...
WECWIS
2009
IEEE
138views ECommerce» more  WECWIS 2009»
15 years 6 months ago
Modelling Flexible Processes with Business Objects
Mainstream business process modelling techniques promote a design paradigm wherein the activities that may be performed within a case, together with their usual execution order, f...
Guy Redding, Marlon Dumas, Arthur H. M. ter Hofste...