Sciweavers

361 search results - page 53 / 73
» Composition of Password-Based Protocols
Sort
View
ATAL
2007
Springer
13 years 11 months ago
Joint conversation specification and compliance
Formal specifications of protocol-oriented agent interactions have focused mainly on the semantics of the constituent agent communication language (ACL). We argue that a proper th...
Shamimabi Paurobally, Michael Wooldridge
AISC
2008
Springer
13 years 9 months ago
Symbolic Computation Software Composability
We present three examples of the composition of Computer Algebra Systems to illustrate the progress on a composability infrastructure as part of the SCIEnce (Symbolic Computation I...
Sebastian Freundt, Peter Horn, Alexander Konovalov...
ACSD
2006
IEEE
109views Hardware» more  ACSD 2006»
13 years 9 months ago
Synthesis of Synchronous Interfaces
Reuse of IP blocks has been advocated as a means to conquer the complexity of today's system-on-chip (SoC) designs. Component integration and verification in such systems is ...
Purandar Bhaduri, S. Ramesh
CI
2011
93views more  CI 2011»
13 years 2 months ago
Supporting clinical processes and decisions by hierarchical planning and scheduling
This paper is focused on how a general-purpose hierarchical planning representation, based on the HTN paradigm, can be used to support the representation of oncology treatment pro...
Juan Fernández-Olivares, Luis A. Castillo, ...
STOC
2009
ACM
91views Algorithms» more  STOC 2009»
14 years 8 months ago
Inaccessible entropy
We put forth a new computational notion of entropy, which measures the (in)feasibility of sampling high entropy strings that are consistent with a given protocol. Specifically, we...
Iftach Haitner, Omer Reingold, Salil P. Vadhan, Ho...