Sciweavers

928 search results - page 97 / 186
» Using fMRI to Test Models of Complex Cognition
Sort
View
SP
2007
IEEE
108views Security Privacy» more  SP 2007»
15 years 4 months ago
Trojan Detection using IC Fingerprinting
Hardware manufacturers are increasingly outsourcing their IC fabrication work overseas due to much lower costs. This poses a significant security risk for ICs used for critical m...
Dakshi Agrawal, Selçuk Baktir, Deniz Karako...
COORDINATION
2006
Springer
15 years 1 months ago
Automated Evaluation of Coordination Approaches
How to coordinate the processes in a complex component-based software system is a nontrivial issue. Many different coordination approaches exist, each with its own specific advanta...
Tibor Bosse, Mark Hoogendoorn, Jan Treur
SMA
1999
ACM
107views Solid Modeling» more  SMA 1999»
15 years 2 months ago
Generation of swept volumes of toroidal endmills in five-axis motion using space curves
Accurate prediction of the swept volume of a cutting tool is essential in NC verification algorithms for detecting deficiencies in a proposed tool path, such as gouging, undercutt...
David Roth, Sanjeev Bedi, Fathy Ismail
DAGSTUHL
2003
14 years 11 months ago
Components, Features, and Agents in the ABC
Abstract. In this paper, we show how the concepts of objects, components, features and agents are used today in the Agent Building Center (ABC) environment in order to marry the mo...
Tiziana Margaria
PROPERTYTESTING
2010
14 years 7 months ago
Sublinear Algorithms in the External Memory Model
We initiate the study of sublinear-time algorithms in the external memory model [Vit01]. In this model, the data is stored in blocks of a certain size B, and the algorithm is char...
Alexandr Andoni, Piotr Indyk, Krzysztof Onak, Roni...