Sciweavers

4350 search results - page 216 / 870
» Case studies for contract-based systems
Sort
View
ACL
2012
13 years 7 months ago
Toward Automatically Assembling Hittite-Language Cuneiform Tablet Fragments into Larger Texts
This paper presents the problem within Hittite and Ancient Near Eastern studies of fragmented and damaged cuneiform texts, and proposes to use well-known text classification metr...
Stephen Tyndall
146
Voted
WOA
2001
15 years 6 months ago
Multi-User and Security Support for Multi-Agent Systems
This paper discusses the requirements an agent system needs to be secure. In particular, the paper introduces a classification of modern distributed systems, and examines the dele...
Agostino Poggi, Giovanni Rimassa, Michele Tomaiuol...
145
Voted
DAC
2003
ACM
16 years 5 months ago
Design flow for HW / SW acceleration transparency in the thumbpod secure embedded system
This paper describes a case study and design flow of a secure embedded system called ThumbPod, which uses cryptographic and biometric signal processing acceleration. It presents t...
David Hwang, Bo-Cheng Lai, Patrick Schaumont, Kazu...
189
Voted
CORR
2004
Springer
191views Education» more  CORR 2004»
15 years 4 months ago
Artificial Intelligence and Systems Theory: Applied to Cooperative Robots
- This paper describes an approach to the design of a population of cooperative robots based on concepts borrowed from Systems Theory and Artificial Intelligence The research has b...
Pedro U. Lima, Luís M. M. Custódio
SEKE
2009
Springer
15 years 11 months ago
Resource Allocation for a Modular Software System
Most existing software optimization research assumes advance knowledge of the component parameters. Perfect future knowledge of fault detection is an unnecessary oversimplificati...
Lance Fiondella, Swapna S. Gokhale