Sciweavers

1127 search results - page 197 / 226
» Theory Extension in ACL2(r)
Sort
View
122
Voted
ECRTS
2004
IEEE
15 years 4 months ago
Managing Quality-of-Control Performance Under Overload Conditions
A common method for dealing with overload conditions in periodic task systems is to reduce the load by enlarging activation periods. When a periodic task implements a digital cont...
Giorgio C. Buttazzo, Manel Velasco, Pau Mart&iacut...
124
Voted
CIKM
2006
Springer
15 years 4 months ago
Adaptive non-linear clustering in data streams
Data stream clustering has emerged as a challenging and interesting problem over the past few years. Due to the evolving nature, and one-pass restriction imposed by the data strea...
Ankur Jain, Zhihua Zhang, Edward Y. Chang
ESORICS
2004
Springer
15 years 4 months ago
Information Flow Control Revisited: Noninfluence = Noninterference + Nonleakage
Abstract. We revisit the classical notion of noninterference for statebased systems, as presented by Rushby in 1992. We strengthen his results in several ways, in particular clarif...
David von Oheimb
98
Voted
ECTEL
2006
Springer
15 years 4 months ago
An Example of Participatory Design Methodology in a Project which Aims at Developing Individual and Organisational Learning in C
The experience described in this paper is being developed in the framework of the PALETTE1 project by two teams of researchers involved in collecting information from some Communi...
Amaury Daele, Martin Erpicum, Liliane Esnault, Fab...
90
Voted
FDTC
2006
Springer
80views Cryptology» more  FDTC 2006»
15 years 4 months ago
Robust Finite Field Arithmetic for Fault-Tolerant Public-Key Cryptography
We present a new approach to fault tolerant public key cryptography based on redundant arithmetic in finite rings. Redundancy is achieved by embedding non-redundant field or ring ...
Gunnar Gaubatz, Berk Sunar