Sciweavers

9503 search results - page 1859 / 1901
» Authenticated System Calls
Sort
View
ICECCS
2010
IEEE
219views Hardware» more  ICECCS 2010»
13 years 11 months ago
Comparison of Six Ways to Extend the Scope of Cheddar to AADL v2 with Osate
Abstract—Cheddar is a framework dedicated to the specification of real-time schedulers, and to their analysis by simulation. It is developed in Ada. Some parts of its modular ar...
Mickaël Kerboeuf, Alain Plantec, Frank Singho...
4OR
2010
137views more  4OR 2010»
13 years 11 months ago
Extended formulations in combinatorial optimization
This survey is concerned with the size of perfect formulations for combinatorial optimization problems. By "perfect formulation", we mean a system of linear inequalities...
Michele Conforti, Gérard Cornuéjols,...
ADHOC
2007
144views more  ADHOC 2007»
13 years 11 months ago
Adaptive gossip protocols: Managing security and redundancy in dense ad hoc networks
Abstract. Many ad hoc routing algorithms rely on broadcast flooding for location discovery or, more generally, for secure routing applications. Flooding is a robust algorithm but ...
Mike Burmester, Tri Van Le, Alec Yasinsac
AI
2007
Springer
13 years 11 months ago
Learning action models from plan examples using weighted MAX-SAT
AI planning requires the definition of action models using a formal action and plan description language, such as the standard Planning Domain Definition Language (PDDL), as inp...
Qiang Yang, Kangheng Wu, Yunfei Jiang
AIEDU
2007
83views more  AIEDU 2007»
13 years 11 months ago
Evidence-based Approach to Interacting with Open Student Models
Research efforts focused on developing "active reports" are currently underway. Active reports are designed to foster communication among teachers, students, and parents ...
Diego Zapata-Rivera, Eric G. Hansen, Valerie J. Sh...
« Prev « First page 1859 / 1901 Last » Next »