Sciweavers

376 search results - page 66 / 76
» Integrity constraints in trust management
Sort
View
DAC
1995
ACM
15 years 3 months ago
A Transformation-Based Approach for Storage Optimization
High-level synthesis (HLS) has been successfully targeted towards the digital signal processing (DSP) domain. Both application-speci c integrated circuits (ASICs) and application-...
Wei-Kai Cheng, Youn-Long Lin
98
Voted
EXACT
2007
15 years 2 months ago
A Discourse Approach to Explanation Aware Knowledge Representation
This study describes a discourse approach to explanation aware knowledge representation. It presents a reasoning model that adheres to argumentation as found in written discourse,...
Andrew Potter
JCP
2006
110views more  JCP 2006»
14 years 11 months ago
Gateway Selection Review in Ad hoc Networks
The nature of wireless mobile ad hoc networks depend on batteries or other fatiguing means for their energy. A limited energy capacity may be the most significant performance const...
Tarek Sheltami
TSMC
2010
14 years 6 months ago
Contrasting Views of Complexity and Their Implications For Network-Centric Infrastructures
There exists a widely recognized need to better understand and manage complex "systems of systems," ranging from biology, ecology, and medicine to network-centric technol...
David L. Alderson, John C. Doyle
VLSID
2003
IEEE
180views VLSI» more  VLSID 2003»
16 years 3 days ago
Automating Formal Modular Verification of Asynchronous Real-Time Embedded Systems
Most verification tools and methodologies such as model checking, equivalence checking, hardware verification, software verification, and hardware-software coverification often fl...
Pao-Ann Hsiung, Shu-Yu Cheng