Sciweavers

3616 search results - page 606 / 724
» Conditional Memory Ordering
Sort
View
IFM
2010
Springer
203views Formal Methods» more  IFM 2010»
15 years 23 days ago
A CSP Approach to Control in Event-B
Event-B has emerged as one of the dominant state-based formal techniques used for modelling control-intensive applications. Due to the blocking semantics of events, their ordering ...
Steve Schneider, Helen Treharne, Heike Wehrheim
IGPL
2010
101views more  IGPL 2010»
15 years 23 days ago
Robust normative systems and a logic of norm compliance
Although normative systems, or social laws, have proved to be a highly influential approach to coordination in multi-agent systems, the issue of compliance to such normative syste...
Thomas Ågotnes, Wiebe van der Hoek, Michael ...
IJCAT
2010
111views more  IJCAT 2010»
15 years 22 days ago
Vision-based 3D surface motion capture for the DIET breast cancer screening system
—Breast cancer is one of the most prevalent forms of cancer in the world today. The search for effective treatment and screening methods is a highly active area of research. The ...
Richard G. Brown, Christopher E. Hann, J. Geoffrey...
140
Voted
INFOCOM
2010
IEEE
15 years 21 days ago
VBS: Maximum Lifetime Sleep Scheduling for Wireless Sensor Networks Using Virtual Backbones
—Wireless sensor network (WSN) applications require redundant sensors to guarantee fault tolerance. However, the same degree of redundancy is not necessary for multi-hop communic...
Yaxiong Zhao, Jie Wu, Feng Li, Sanglu Lu
INFORMATICALT
2010
126views more  INFORMATICALT 2010»
15 years 21 days ago
Identity-Based Threshold Proxy Signature from Bilinear Pairings
Abstract. Delegation of rights is a common practice in the real world. We present two identitybased threshold proxy signature schemes, which allow an original signer to delegate he...
Jenshiuh Liu, Shaonung Huang