Sciweavers

925 search results - page 151 / 185
» Typing Component-Based Communication Systems
Sort
View
CN
2006
91views more  CN 2006»
14 years 10 months ago
Reputation-based policies that provide the right incentives in peer-to-peer environments
Peer-to-peer are popular environments for exchanging services. A reputation mechanism is a proper means of discovering low-performing peers that fail to provide their services. In...
Thanasis G. Papaioannou, George D. Stamoulis
JCM
2007
95views more  JCM 2007»
14 years 9 months ago
Signal Canceller in the Carrier Super-positioning Satellite Networks
—To establish the interference canceller, generating replicas of unwanted carriers is a key. This paper addresses the design and performances of two types of signal canceller tha...
Mayumi Osato, Hiroyuki Kobashi, Robert Y. Omaki, T...
CHI
2004
ACM
15 years 10 months ago
Email task management styles: the cleaners and the keepers
Email has become overloaded as users make use of email tools for performing a wide range of activities. Previous studies have demonstrated the different strategies employed by ema...
Jacek Gwizdka
ICCAD
2008
IEEE
127views Hardware» more  ICCAD 2008»
15 years 6 months ago
Verification of arithmetic datapaths using polynomial function models and congruence solving
Abstract— This paper addresses the problem of solving finite word-length (bit-vector) arithmetic with applications to equivalence verification of arithmetic datapaths. Arithmet...
Neal Tew, Priyank Kalla, Namrata Shekhar, Sivaram ...
CCS
2009
ACM
15 years 4 months ago
Reactive noninterference
Many programs operate reactively, patiently waiting for user input, subsequently running for a while producing output, and eventually returning to a state where they are ready to ...
Aaron Bohannon, Benjamin C. Pierce, Vilhelm Sj&oum...