Sciweavers

2514 search results - page 494 / 503
» The use of industrial-strength formal methods
Sort
View
ICCAD
2005
IEEE
132views Hardware» more  ICCAD 2005»
15 years 5 months ago
Battery optimization vs energy optimization: which to choose and when?
— Batteries are non-ideal energy sources – minimizing the energy consumption of a battery-powered system is not equivalent to maximizing its battery life. We propose an alterna...
Ravishankar Rao, Sarma B. K. Vrudhula
ICDCS
2005
IEEE
15 years 5 months ago
Enhancing Source-Location Privacy in Sensor Network Routing
— One of the most notable challenges threatening the successful deployment of sensor systems is privacy. Although many privacy-related issues can be addressed by security mechani...
Pandurang Kamat, Yanyong Zhang, Wade Trappe, Celal...
KCAP
2005
ACM
15 years 5 months ago
Acquisition and maintenance of constraints in engineering design
The Designers’ Workbench is a system, developed by the Advanced Knowledge Technologies (AKT) consortium to support designers in large organizations, such as RollsRoyce, by makin...
Suraj Ajit, Derek H. Sleeman, David W. Fowler, Dav...
SASN
2005
ACM
15 years 5 months ago
On the security of group communication schemes based on symmetric key cryptosystems
Many emerging applications in both wired and wireless networks, such as information dissemination and distributed collaboration in an adversarial environment, need support of secu...
Shouhuai Xu
ADBIS
2005
Springer
147views Database» more  ADBIS 2005»
15 years 5 months ago
Declarative Data Fusion - Syntax, Semantics, and Implementation
In today’s integrating information systems data fusion, i.e., the merging of multiple tuples about the same real-world object into a single tuple, is left to ETL tools and other ...
Jens Bleiholder, Felix Naumann