Sciweavers

181 search results - page 33 / 37
» It's About Time: Real-Time Logics Reviewed
Sort
View
123
Voted
GI
2009
Springer
14 years 11 months ago
Service-oriented Event Assessment - Closing the Gap of IT Security Compliance Management
: Frequently, Security Monitoring is equated with network intrusion detection. However, Security Monitoring has a much broader scope. It also comprises detection of insider attacks...
Frederic Majer, Martin Nussbaumer, Dieter Riexinge...
119
Voted
CSL
2010
Springer
15 years 2 months ago
From Feasible Proofs to Feasible Computations
We shall discuss several situations in which it is possible to extract from a proof, be it a proof in a first-order theory or a propositional proof, some feasible computational inf...
Jan Krajícek
ICCAD
2005
IEEE
87views Hardware» more  ICCAD 2005»
15 years 10 months ago
Statistical technology mapping for parametric yield
The increasing variability of process parameters leads to substantial parametric yield losses due to timing and leakage power constraints. Leakage power is especially affected by ...
Ashish Kumar Singh, Murari Mani, Michael Orshansky
125
Voted
AI
2007
Springer
15 years 1 months ago
Audiences in argumentation frameworks
Although reasoning about what is the case has been the historic focus of logic, reasoning about what should be done is an equally important capacity for an intelligent agent. Reas...
Trevor J. M. Bench-Capon, Sylvie Doutre, Paul E. D...
TMC
2012
13 years 4 months ago
Message Drop and Scheduling in DTNs: Theory and Practice
Abstract—In order to achieve data delivery in Delay Tolerant Networks (DTN), researchers have proposed the use of store-carryand-forward protocols: a node there may store a messa...
Amir Krifa, Chadi Barakat, Thrasyvoulos Spyropoulo...