Sciweavers

5378 search results - page 939 / 1076
» Base Logics in Argumentation
Sort
View
ICPP
2005
IEEE
14 years 2 months ago
Locality-Aware Randomized Load Balancing Algorithms for DHT Networks
Structured P2P overlay networks based on a consistent hashing function have an aftermath load balance problem that needs to be dealt with. A load balancing method should take into...
Haiying Shen, Cheng-Zhong Xu
ISDA
2005
IEEE
14 years 2 months ago
Hybrid Fuzzy-Genetic Algorithm Approach for Crew Grouping
Crew grouping is an important problem and formulating a good solution always involves many challenges. For example, grouping soldiers intelligently to tank combat units, we should...
Hongbo Liu, Zhanguo Xu, Ajith Abraham
ISQED
2005
IEEE
125views Hardware» more  ISQED 2005»
14 years 2 months ago
A New Method for Design of Robust Digital Circuits
As technology continues to scale beyond 100nm, there is a significant increase in performance uncertainty of CMOS logic due to process and environmental variations. Traditional c...
Dinesh Patil, Sunghee Yun, Seung-Jean Kim, Alvin C...
KBSE
2005
IEEE
14 years 2 months ago
Identifying traits with formal concept analysis
Traits are basically mixins or interfaces but with method bodies. In languages that support traits, classes are composed out of traits. There are two main advantages with traits. ...
Adrian Lienhard, Stéphane Ducasse, Gabriela...
KBSE
2005
IEEE
14 years 2 months ago
A threat-driven approach to modeling and verifying secure software
This paper presents a formal approach to threat-driven modeling and verification of secure software using aspect-oriented Petri nets. Based on the behavior model of intended funct...
Dianxiang Xu, Kendall E. Nygard