Security is a common problem in completely decentralized peer-to-peer systems. Although several suggestions exist on how to create a secure key-based routing protocol, a practicab...
Retiming is an optimization technique for synchronous circuits introduced by Leiserson and Saxe in 1983. Although powerful, retiming is not very widely used because it does not ha...
Klaus Eckl, Jean Christophe Madre, Peter Zepter, C...
— Software is often constructed using a layered approach to encapsulate various functionality in corresponding layers. Individual requirements of each layer demand layer specifi...
Michael Thonhauser, Gernot Schmoelzer, Christian K...
This paper presents three methods implemented in the activity-based construction modeling and simulation (ABC) system for validating a construction simulation. The first method re...
The Hepar II system is based on a Bayesian network model of a subset of the domain of hepatology in which the structure of the network is elicited from an expert diagnostician and ...