Sciweavers

376 search results - page 66 / 76
» Integrity constraints in trust management
Sort
View
DAC
1995
ACM
15 years 5 months ago
A Transformation-Based Approach for Storage Optimization
High-level synthesis (HLS) has been successfully targeted towards the digital signal processing (DSP) domain. Both application-speci c integrated circuits (ASICs) and application-...
Wei-Kai Cheng, Youn-Long Lin
EXACT
2007
15 years 4 months ago
A Discourse Approach to Explanation Aware Knowledge Representation
This study describes a discourse approach to explanation aware knowledge representation. It presents a reasoning model that adheres to argumentation as found in written discourse,...
Andrew Potter
JCP
2006
110views more  JCP 2006»
15 years 1 months ago
Gateway Selection Review in Ad hoc Networks
The nature of wireless mobile ad hoc networks depend on batteries or other fatiguing means for their energy. A limited energy capacity may be the most significant performance const...
Tarek Sheltami
118
Voted
TSMC
2010
14 years 8 months ago
Contrasting Views of Complexity and Their Implications For Network-Centric Infrastructures
There exists a widely recognized need to better understand and manage complex "systems of systems," ranging from biology, ecology, and medicine to network-centric technol...
David L. Alderson, John C. Doyle
VLSID
2003
IEEE
180views VLSI» more  VLSID 2003»
16 years 2 months ago
Automating Formal Modular Verification of Asynchronous Real-Time Embedded Systems
Most verification tools and methodologies such as model checking, equivalence checking, hardware verification, software verification, and hardware-software coverification often fl...
Pao-Ann Hsiung, Shu-Yu Cheng