Sciweavers

1024 search results - page 145 / 205
» Value complete, column complete, predicate complete
Sort
View
RSCTC
1993
Springer
96views Fuzzy Logic» more  RSCTC 1993»
15 years 4 months ago
Trusting an Information Agent
: While the common kinds of uncertainties in databases (e.g., null values, disjunction, corrupt/missing data, domain mismatch, etc.) have been extensively studied, a relatively une...
Hasan M. Jamil, Fereidoon Sadri
ATVA
2007
Springer
90views Hardware» more  ATVA 2007»
15 years 3 months ago
Efficient Approximate Verification of Promela Models Via Symmetry Markers
We present a new verification technique for Promela which exploits state-space symmetries induced by scalarset values used in a model. The technique involves efficiently computing ...
Dragan Bosnacki, Alastair F. Donaldson, Michael Le...
CTRSA
2007
Springer
153views Cryptology» more  CTRSA 2007»
15 years 3 months ago
Differential Power Analysis of Stream Ciphers
Side-channel attacks on block ciphers and public key algorithms have been discussed extensively. However, there is only sparse literature about side-cannel attacks on stream cipher...
Wieland Fischer, Berndt M. Gammel, O. Kniffler, J....
ESA
2007
Springer
105views Algorithms» more  ESA 2007»
15 years 3 months ago
Finding Mobile Data: Efficiency vs. Location Inaccuracy
A token is hidden in one out of n boxes following some known probability distribution and then all the boxes are locked. The goal of a searcher is to find the token in at most D n...
Amotz Bar-Noy, Joanna Klukowska
DATE
2007
IEEE
141views Hardware» more  DATE 2007»
15 years 3 months ago
Energy-efficient real-time task scheduling with task rejection
In the past decade, energy-efficiency has been an important system design issue in both hardware and software managements. For mobile applications with critical missions, both ene...
Jian-Jia Chen, Tei-Wei Kuo, Chia-Lin Yang, Ku-Jei ...