Sciweavers

1169 search results - page 92 / 234
» Two Ways to Common Knowledge
Sort
View
ATAL
2001
Springer
15 years 2 months ago
Ontological Overhearing
Abstract. The collaboration between two intelligent agents can be greatly enhanced if a third agent, who has some understanding of the communication between the first two, interve...
Marco Aiello, Paolo Busetta, Antonia Donà, ...
IPPS
2006
IEEE
15 years 3 months ago
A case for exploit-robust and attack-aware protocol RFCs
A large number of vulnerabilities occur because protocol implementations failed to anticipate illegal packets. rfcs typically define what constitute “right” packets relevant ...
Venkat Pothamsetty, Prabhaker Mateti
VIS
2009
IEEE
191views Visualization» more  VIS 2009»
15 years 11 months ago
Parameter Sensitivity Visualization in DTI Fiber Tracking
Fiber tracking of Diffusion Tensor Imaging (DTI) data offers a unique insight into the three-dimensional organisation of white matter structures in the living brain. However, fiber...
Ralph Brecheisen, Bram Platel, Anna Vilanova, B...
ICSE
2008
IEEE-ACM
15 years 10 months ago
From programming to modeling: our experience with a distributed software engineering course
Distributed Software Engineering (DSE) concepts in Computer Science (or Engineering) Degrees are commonly introduced using a hands-on approach mainly consisting of teaching a part...
Antonio Vallecillo, Francisco Durán, Jordi ...
ICCD
2005
IEEE
114views Hardware» more  ICCD 2005»
15 years 6 months ago
Memory Bank Predictors
Cache memories are commonly implemented through multiple memory banks to improve bandwidth and latency. The early knowledge of the data cache bank that an instruction will access ...
Stefan Bieschewski, Joan-Manuel Parcerisa, Antonio...