Sciweavers

734 search results - page 79 / 147
» Computer Virus Propagation Models
Sort
View
VLSID
2006
IEEE
129views VLSI» more  VLSID 2006»
15 years 10 months ago
Modeling and Reduction of Gate Leakage during Behavioral Synthesis of NanoCMOS Circuits
For a nanoCMOS of sub-65nm technology, where the gate oxide (SiO2) thickness is very low, the gate leakage is one of the major components of power dissipation. In this paper, we pr...
Saraju P. Mohanty, Elias Kougianos
EDBT
2008
ACM
149views Database» more  EDBT 2008»
15 years 10 months ago
A probabilistic trust model for semantic peer to peer systems
Semantic peer to peer (P2P) systems are fully decentralized overlay networks of people or machines (called peers) sharing and searching varied resources (documents, videos, photos...
Gia Hien Nguyen, Philippe Chatalic, Marie-Christin...
ATAL
2008
Springer
14 years 12 months ago
Structure in threes: modelling organization-oriented software architectures built upon multi-agent systems
Software systems are subject to increasing complexity and in need of efficient structuring. Multi-agent system research has come up with approaches for an organization-oriented co...
Matthias Wester-Ebbinghaus, Daniel Moldt
ECAI
2008
Springer
14 years 11 months ago
A probabilistic trust model for semantic peer-to-peer systems
Semantic peer to peer (P2P) systems are fully decentralized overlay networks of people or machines (called peers) sharing and searching varied resources (documents, videos, photos...
Gia Hien Nguyen, Philippe Chatalic, Marie-Christin...
SIGPRO
2008
106views more  SIGPRO 2008»
14 years 9 months ago
Propagator-based methods for recursive subspace model identification
The problem of the online identification of multi-input multi-output (MIMO) state-space models in the framework of discrete-time subspace methods is considered in this paper. Seve...
Guillaume Mercère, Laurent Bako, Sté...