Sciweavers

6431 search results - page 1067 / 1287
» Model Building by Resolution
Sort
View
135
Voted
WISEC
2010
ACM
15 years 10 months ago
On the tradeoff between trust and privacy in wireless ad hoc networks
As privacy moves to the center of attention in networked systems, and the need for trust remains a necessity, an important question arises: How do we reconcile the two seemingly c...
Maxim Raya, Reza Shokri, Jean-Pierre Hubaux
152
Voted
VMCAI
2010
Springer
15 years 10 months ago
Regular Linear Temporal Logic with Past
This paper upgrades Regular Linear Temporal Logic (RLTL) with past operators and complementation. RLTL is a temporal logic that extends the expressive power of linear temporal logi...
César Sánchez, Martin Leucker
122
Voted
HICSS
2010
IEEE
178views Biometrics» more  HICSS 2010»
15 years 10 months ago
Desperately Seeking the Infrastructure in IS Research: Conceptualization of "Digital Convergence" As Co-Evolution of Social and
Large scale penetration of digital technologies led them to join roads, electricity, and water distribution, as essential infrastructures of modernity. “Digital convergence” r...
David Tilson, Kalle Lyytinen, Carsten Søren...
102
Voted
CHI
2010
ACM
15 years 10 months ago
Curator: a game with a purpose for collection recommendation
Collection recommender systems suggest groups of items that work well as a whole. The interaction effects between items is an important consideration, but the vast space of possib...
Greg Walsh, Jennifer Golbeck
134
Voted
ISPD
2010
ACM
205views Hardware» more  ISPD 2010»
15 years 10 months ago
Total sensitivity based dfm optimization of standard library cells
Standard cells are fundamental circuit building blocks designed at very early design stages. Nanometer standard cells are prone to lithography proximity and process variations. Ho...
Yongchan Ban, Savithri Sundareswaran, David Z. Pan
« Prev « First page 1067 / 1287 Last » Next »