Sciweavers

1963 search results - page 305 / 393
» Applications of Preferences using Answer Set Programming
Sort
View
97
Voted
CADE
2008
Springer
16 years 2 months ago
Proving Group Protocols Secure Against Eavesdroppers
Security protocols are small programs designed to ensure properties such as secrecy of messages or authentication of parties in a hostile environment. In this paper we investigate ...
Steve Kremer, Antoine Mercier 0002, Ralf Treinen
118
Voted
MEMOCODE
2007
IEEE
15 years 8 months ago
Scheduling as Rule Composition
Bluespec is a high-level hardware description language used for architectural exploration, hardware modeling and synthesis of semiconductor chips. In Bluespec, one views hardware ...
Nirav Dave, Arvind, Michael Pellauer
140
Voted
ARGMAS
2007
Springer
15 years 8 months ago
Defeasible Argumentation Support for an Extended BDI Architecture
Abstract. In this work, an agent architecture that combines defeasible argumentation and the BDI model is described. Argumentation will be used as a mechanism for reasoning about b...
Nicolás D. Rotstein, Alejandro Javier Garc&...
116
Voted
CSB
2003
IEEE
128views Bioinformatics» more  CSB 2003»
15 years 7 months ago
Degenerate Primer Design via Clustering
This paper describes a new strategy for designing degenerate primers for a given multiple alignment of amino acid sequences. Degenerate primers are useful for amplifying homologou...
Xintao Wei, David N. Kuhn, Giri Narasimhan
108
Voted
ICSE
2007
IEEE-ACM
16 years 2 months ago
Reconceptualizing a Family of Heterogeneous Embedded Systems via Explicit Architectural Support
It has been widely advocated that software architecture an effective set of abstractions for engineering (families of) complex software systems. However, architectural concepts ar...
Sam Malek, Chiyoung Seo, Sharmila Ravula, Brad Pet...