Sciweavers

423 search results - page 32 / 85
» Specifying Strategies for Exercises
Sort
View
SEFM
2007
IEEE
15 years 4 months ago
Verifying Security Properties of Cryptoprotocols: A Novel Approach
We model security protocols as a game tree using concepts of game semantics. Using this model we ascribe semantics to protocols written in the standard simple arrow notation. Acco...
Mohamed Saleh, Mourad Debbabi
IPPS
2005
IEEE
15 years 3 months ago
Reliability-Conscious Process Scheduling under Performance Constraints in FPGA-Based Embedded Systems
This paper proposes, for the FPGA-based embedded systems, a reliability-aware process scheduling strategy that operates under performance bounds. A unique characteristic of the pr...
Guilin Chen, Mahmut T. Kandemir, Suleyman Tosun, U...
CPAIOR
2005
Springer
15 years 3 months ago
Nondeterministic Control for Hybrid Search
Hybrid algorithms combining local and systematic search often use nondeterminism in fundamentally different ways. They may differ in the strategy to explore the search tree and/o...
Pascal Van Hentenryck, Laurent Michel
SETN
2004
Springer
15 years 3 months ago
Data Brokers: Building Collections through Automated Negotiation
Collecting digital materials is time-consuming and can gain from automation. Since each source—and even each acquisition—may involve a separate negotiation of terms, a collecto...
Fillia Makedon, Song Ye, Sheng Zhang, James Ford, ...
FLAIRS
2001
14 years 11 months ago
Improving Knowledge-Based System Performance by Reordering Rule Sequences
In this paper, we argue that KBS validation should not be limited to testing functional properties of the system, such as its input - output behavior, but must also address its dy...
Neli Zlatareva