Sciweavers

361 search results - page 53 / 73
» Composition of Password-Based Protocols
Sort
View
ATAL
2007
Springer
15 years 1 months ago
Joint conversation specification and compliance
Formal specifications of protocol-oriented agent interactions have focused mainly on the semantics of the constituent agent communication language (ACL). We argue that a proper th...
Shamimabi Paurobally, Michael Wooldridge
AISC
2008
Springer
14 years 11 months ago
Symbolic Computation Software Composability
We present three examples of the composition of Computer Algebra Systems to illustrate the progress on a composability infrastructure as part of the SCIEnce (Symbolic Computation I...
Sebastian Freundt, Peter Horn, Alexander Konovalov...
ACSD
2006
IEEE
109views Hardware» more  ACSD 2006»
14 years 11 months ago
Synthesis of Synchronous Interfaces
Reuse of IP blocks has been advocated as a means to conquer the complexity of today's system-on-chip (SoC) designs. Component integration and verification in such systems is ...
Purandar Bhaduri, S. Ramesh
91
Voted
CI
2011
93views more  CI 2011»
14 years 4 months ago
Supporting clinical processes and decisions by hierarchical planning and scheduling
This paper is focused on how a general-purpose hierarchical planning representation, based on the HTN paradigm, can be used to support the representation of oncology treatment pro...
Juan Fernández-Olivares, Luis A. Castillo, ...
80
Voted
STOC
2009
ACM
91views Algorithms» more  STOC 2009»
15 years 10 months ago
Inaccessible entropy
We put forth a new computational notion of entropy, which measures the (in)feasibility of sampling high entropy strings that are consistent with a given protocol. Specifically, we...
Iftach Haitner, Omer Reingold, Salil P. Vadhan, Ho...