Sciweavers

3104 search results - page 438 / 621
» Using quantitative analysis to implement autonomic IT system...
Sort
View
OPODIS
2003
15 years 6 months ago
Detecting Temporal Logic Predicates in Distributed Programs Using Computation Slicing
Detecting whether a finite execution trace (or a computation) of a distributed program satisfies a given predicate, called predicate detection, is a fundamental problem in distr...
Alper Sen, Vijay K. Garg
163
Voted
HICSS
2003
IEEE
123views Biometrics» more  HICSS 2003»
15 years 10 months ago
A Two-Level Approach to Making Class Predictions
In this paper we propose a new two-level methodology for assessing countries’/companies’ economic/financial performance. The methodology is based on two major techniques of gr...
Adrian Costea, Tomas Eklund
CISST
2003
88views Hardware» more  CISST 2003»
15 years 6 months ago
Virtual Experts for Imagery Registration and Conflation
The unique human expertise in imagery analysis should be preserved and shared with other imagery analysts to improve image analysis and decision-making. Such knowledge can serve a...
Boris Kovalerchuk, Artemus Harper, Michael Kovaler...
ATAL
2008
Springer
15 years 7 months ago
A realistic model of frequency-based multi-robot polyline patrolling
There is growing interest in multi-robot frequency-based patrolling, in which a team of robots optimizes its frequency of point visits, for every point in a target work area. In p...
Yehuda Elmaliach, Asaf Shiloni, Gal A. Kaminka
SAMOS
2007
Springer
15 years 11 months ago
A Simulation-Based Methodology for Evaluating the DPA-Resistance of Cryptographic Functional Units with Application to CMOS and
Abstract— This paper explores the resistance of MOS Current Mode Logic (MCML) against Differential Power Analysis (DPA) attacks. Circuits implemented in MCML, in fact, have uniqu...
Francesco Regazzoni, Stéphane Badel, Thomas...