Sciweavers

5246 search results - page 942 / 1050
» Sanitization models and their limitations
Sort
View
FM
2006
Springer
172views Formal Methods» more  FM 2006»
15 years 1 months ago
The Embedded Systems Design Challenge
We summarize some current trends in embedded systems design and point out some of their characteristics, such as the chasm between analytical and computational models, and the gap ...
Thomas A. Henzinger, Joseph Sifakis
INFOCOM
1995
IEEE
15 years 1 months ago
Degree-Constrained Multicasting in Point-to-Point Networks
Establishing a multicast tree in a point-to-point network of switch nodes, such as a wide-area ATM network, is often modeled as the NP-complete Steiner problem in networks. In thi...
Fred Bauer, Anujan Varma
HT
1987
ACM
15 years 1 months ago
Exploring Representation Problems Using Hypertext
Hypertext is a technology well-suited to exploring different kinds of representational problems. It can be used first as an informal mechanism to describe the attributes of object...
Catherine C. Marshall
AAAI
2008
15 years 7 days ago
Computational Influence for Training and Entertainment
2) a set of abstract drama manager; 3) a model of player response to drama manager actions; and 4) an author-specified evaluation function. The drama manager's task is to sele...
David L. Roberts
LISA
2007
15 years 7 days ago
Assisted Firewall Policy Repair Using Examples and History
Firewall policies can be extremely complex and difficult to maintain, especially on networks with more than a few hundred machines. The difficulty of configuring a firewall proper...
Robert M. Marmorstein, Phil Kearns