Sciweavers

4897 search results - page 930 / 980
» Trust Modeling for Peer-to-Peer Based Computing Systems
Sort
View
ASSETS
2009
ACM
15 years 4 months ago
Better vocabularies for assistive communication aids: connecting terms using semantic networks and untrained annotators
The difficulties of navigating vocabulary in an assistive communication device are exacerbated for individuals with lexical access disorders like those due to aphasia. We present ...
Sonya S. Nikolova, Jordan L. Boyd-Graber, Christia...
ICCAD
2000
IEEE
169views Hardware» more  ICCAD 2000»
15 years 4 months ago
Transistor-Level Timing Analysis Using Embedded Simulation
A high accuracy system for transistor-level static timing analysis is presented. Accurate static timing verification requires that individual gate and interconnect delays be accu...
Pawan Kulshreshtha, Robert Palermo, Mohammad Morta...
CAV
2000
Springer
97views Hardware» more  CAV 2000»
15 years 4 months ago
Detecting Errors Before Reaching Them
Abstract. Any formalmethodor tool is almostcertainlymoreoftenapplied in situationswheretheoutcomeis failure(acounterexample)rather than success (a correctness proof). We present a ...
Luca de Alfaro, Thomas A. Henzinger, Freddy Y. C. ...
ISCA
1997
IEEE
137views Hardware» more  ISCA 1997»
15 years 4 months ago
A Language for Describing Predictors and Its Application to Automatic Synthesis
As processor architectures have increased their reliance on speculative execution to improve performance, the importance of accurate prediction of what to execute speculatively ha...
Joel S. Emer, Nicholas C. Gloy
ICLP
2010
Springer
15 years 3 months ago
HEX Programs with Action Atoms
hex programs were originally introduced as a general framework for extending declarative logic programming, under the stable model semantics, with the possibility of bidirectional...
Selen Basol, Ozan Erdem, Michael Fink, Giovambatti...