Sciweavers

1963 search results - page 305 / 393
» Applications of Preferences using Answer Set Programming
Sort
View
CADE
2008
Springer
14 years 9 months ago
Proving Group Protocols Secure Against Eavesdroppers
Security protocols are small programs designed to ensure properties such as secrecy of messages or authentication of parties in a hostile environment. In this paper we investigate ...
Steve Kremer, Antoine Mercier 0002, Ralf Treinen
30
Voted
MEMOCODE
2007
IEEE
14 years 3 months ago
Scheduling as Rule Composition
Bluespec is a high-level hardware description language used for architectural exploration, hardware modeling and synthesis of semiconductor chips. In Bluespec, one views hardware ...
Nirav Dave, Arvind, Michael Pellauer
ARGMAS
2007
Springer
14 years 3 months ago
Defeasible Argumentation Support for an Extended BDI Architecture
Abstract. In this work, an agent architecture that combines defeasible argumentation and the BDI model is described. Argumentation will be used as a mechanism for reasoning about b...
Nicolás D. Rotstein, Alejandro Javier Garc&...
CSB
2003
IEEE
128views Bioinformatics» more  CSB 2003»
14 years 2 months ago
Degenerate Primer Design via Clustering
This paper describes a new strategy for designing degenerate primers for a given multiple alignment of amino acid sequences. Degenerate primers are useful for amplifying homologou...
Xintao Wei, David N. Kuhn, Giri Narasimhan
ICSE
2007
IEEE-ACM
14 years 8 months ago
Reconceptualizing a Family of Heterogeneous Embedded Systems via Explicit Architectural Support
It has been widely advocated that software architecture an effective set of abstractions for engineering (families of) complex software systems. However, architectural concepts ar...
Sam Malek, Chiyoung Seo, Sharmila Ravula, Brad Pet...