Sciweavers

1929 search results - page 177 / 386
» Change Propagation Analysis Using Domain Information
Sort
View
ISQED
2003
IEEE
109views Hardware» more  ISQED 2003»
15 years 9 months ago
Optimizing the Energy-Delay-Ringing Product in On-Chip CMOS Line Drivers
Abstract- This paper presents a detailed empirical study and analytical derivation of voltage wave-form and energy dissipation of global lines driven by CMOS drivers. It is shown t...
Soroush Abbaspour, Massoud Pedram, Payam Heydari
SPAA
2003
ACM
15 years 9 months ago
Information gathering in adversarial systems: lines and cycles
In this paper we consider the problem of routing packets to a single destination in a dynamically changing network, where both the network and the packet injections are under adve...
Kishore Kothapalli, Christian Scheideler
CATA
2003
15 years 5 months ago
A Restaurant Finder using Belief-Desire-Intention Agent Model and Java Technology
It is becoming more important to design systems capable of performing high-level management and control tasks in interactive dynamic environments. At the same time, it is difficul...
Dongqing Lin, Thomas P. Wiggen, Chang-Hyun Jo
DAGSTUHL
2009
15 years 5 months ago
Using Architecture Models to Support the Generation and Operation of Component-Based Adaptive Systems
Modelling architectural information is particularly important because of the acknowledged crucial role of software architecture in raising the level of abstraction during developme...
Nelly Bencomo, Gordon S. Blair
ICDE
2007
IEEE
134views Database» more  ICDE 2007»
15 years 10 months ago
Apply Model Checking to Security Analysis in Trust Management
Trust management is a form of access control that uses delegation to achieve scalability beyond a single organization or federation. However, delegation can be difficult to contr...
Mark Reith, Jianwei Niu, William H. Winsborough