Sciweavers

3971 search results - page 633 / 795
» On the Use of Properties in Java Applications
Sort
View
INFFUS
2010
121views more  INFFUS 2010»
15 years 3 months ago
The statistical mechanics of belief sharing in multi-agent systems
- Many exciting, emerging applications require that a group of agents share a coherent view of the world given spatial distribution, incomplete and uncertain sensors, and communica...
Robin Glinton, Katia P. Sycara, David Scerri, Paul...
123
Voted
SYNTHESE
2010
76views more  SYNTHESE 2010»
15 years 3 months ago
The epistemic goal of a concept: accounting for the rationality of semantic change and variation
: The discussion presents a framework of concepts that is intended to account for the rationality of semantic change and variation, suggesting that each scientific concept consists...
Ingo Brigandt
146
Voted
TRUST
2010
Springer
15 years 3 months ago
Key Attestation from Trusted Execution Environments
Abstract. Credential platforms implemented on top of Trusted Execution Environments3 (TrEEs) allow users to store and use their credentials, e.g., cryptographic keys or user passwo...
Kari Kostiainen, Alexandra Dmitrienko, Jan-Erik Ek...
JPDC
2011
129views more  JPDC 2011»
15 years 6 hour ago
Static timing analysis for modeling QoS in networks-on-chip
Networks-on-chip (NoCs) are used in a growing number of SoCs and multi-core processors. Because messages compete for the NoC’s shared resources, quality of service and resource ...
Evgeni Krimer, Isaac Keslassy, Avinoam Kolodny, Is...
JCS
2010
80views more  JCS 2010»
14 years 12 months ago
Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols
We introduce constraint differentiation, a powerful technique for reducing search when model-checking security protocols using constraint-based methods. Constraint differentiation...
Sebastian Mödersheim, Luca Viganò, Dav...