Sciweavers

1926 search results - page 90 / 386
» Hierarchical Peer-to-Peer Systems
Sort
View
LICS
2003
IEEE
15 years 5 months ago
Reasoning about Hierarchical Storage
In this paper, we develop a new substructural logic that can encode invariants necessary for reasoning about hierarchical storage. We show how the logic can be used to describe th...
Amal J. Ahmed, Limin Jia, David Walker
ATAL
2003
Springer
15 years 5 months ago
Discovering and exploiting synergy between hierarchical planning agents
Agents interacting in a multiagent environment not only have to be wary of interfering with each other when carrying out their tasks, but also should capitalize on opportunities f...
Jeffrey S. Cox, Edmund H. Durfee
89
Voted
GD
2009
Springer
15 years 5 months ago
Port Constraints in Hierarchical Layout of Data Flow Diagrams
Abstract. We present a new application for graph drawing in the context of graphical model-based system design, where manual placing of graphical items is still state-of-the-practi...
Miro Spönemann, Hauke Fuhrmann, Reinhard von ...
75
Voted
ICCD
2000
IEEE
69views Hardware» more  ICCD 2000»
15 years 5 months ago
Hierarchical Simulation of a Multiprocessor Architecture
When proposing new architectural enhancements, it is also important to account for the hardware complexity. To achieve this goal, we propose to model the new design in a hardware ...
Marius Pirvu, Laxmi N. Bhuyan, Rabi N. Mahapatra
CRYPTO
2006
Springer
224views Cryptology» more  CRYPTO 2006»
15 years 4 months ago
Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)
We present an identity-based cryptosystem that features fully anonymous ciphertexts and hierarchical key delegation. We give a proof of security in the standard model, based on the...
Xavier Boyen, Brent Waters