Sciweavers

535 search results - page 90 / 107
» Checking Computations in Polylogarithmic Time
Sort
View
BPM
2010
Springer
191views Business» more  BPM 2010»
13 years 8 months ago
Correctness Ensuring Process Configuration: An Approach Based on Partner Synthesis
Abstract. A configurable process model describes a family of similar process models in a given domain. Such a model can be configured to obtain a specific process model that is sub...
Wil M. P. van der Aalst, Niels Lohmann, Marcello L...
CCCG
2009
13 years 8 months ago
Enumeration of Polyominoes for p4 Tiling
Polyominoes are the two dimensional shapes made by connecting n unit squares, joined along their edges. In this paper, we propose algorithms to enumerate polyominoes for p4 tiling...
Takashi Horiyama, Masato Samejima
JMM2
2006
129views more  JMM2 2006»
13 years 7 months ago
Delivering Audio and Video with Rich Site Summary Enclosures
- Rich Site Summary (RSS) technology is a web content syndication format commonly used to organise news and the content of news-like sites. Indeed any information that can be broke...
Kevin Curran, Sheila McKinney
TON
2008
75views more  TON 2008»
13 years 7 months ago
TVA: a DoS-limiting network architecture
We motivate the capability approach to network denial-of-service (DoS) attacks, and evaluate the TVA architecture which builds on capabilities. With our approach, rather than send ...
Xiaowei Yang, David Wetherall, Thomas E. Anderson
ET
2008
92views more  ET 2008»
13 years 7 months ago
Hardware and Software Transparency in the Protection of Programs Against SEUs and SETs
Processor cores embedded in systems-on-a-chip (SoCs) are often deployed in critical computations, and when affected by faults they may produce dramatic effects. When hardware harde...
Eduardo Luis Rhod, Carlos Arthur Lang Lisbôa...