Sciweavers

7839 search results - page 346 / 1568
» What's there and what's not
Sort
View
SRDS
2000
IEEE
15 years 6 months ago
Deterministic Scheduling for Transactional Multithreaded Replicas
One way to implement a fault-tolerant a service is by replicating it at sites that fail independently. One of the replication techniques is active replication where each request i...
Ricardo Jiménez-Peris, Marta Patiño-...
ASPDAC
2000
ACM
97views Hardware» more  ASPDAC 2000»
15 years 6 months ago
Symbolic debugging of globally optimized behavioral specifications
Symbolic debuggers are system development tools that can accelerate the validation speed of behavioral specifications by allowing a user to interact with an executing code at the ...
Inki Hong, Darko Kirovski, Miodrag Potkonjak, Mari...
CHES
2000
Springer
111views Cryptology» more  CHES 2000»
15 years 6 months ago
How to Explain Side-Channel Leakage to Your Kids
This paper will attempt to explain some of the side-channel attack techniques in a fashion that is easily comprehensible by the layman. What follows is a presentation of three diļ¬...
David Naccache, Michael Tunstall
AIMSA
1998
Springer
15 years 6 months ago
Knowledge Granularity and Action Selection
Abstract. In this paper we introduce the concept of knowledge granularity and study its influence on an agent's action selection process. Action selection is critical to an ag...
Yiming Ye, John K. Tsotsos
ICLP
1998
Springer
15 years 6 months ago
Iterated Logic Program Updates
The eld of theory update has seen some improvement, in what regards updating, by allowing desired updates to be speci ed by update programs. The updating of models is governed by ...
João Alexandre Leite, Luís Moniz Per...