Sciweavers

4401 search results - page 763 / 881
» Computing with Default Logic
Sort
View
VALUETOOLS
2006
ACM
107views Hardware» more  VALUETOOLS 2006»
14 years 2 months ago
Thresholds for virus spread on networks
We study how the spread of computer viruses, worms, and other self-replicating malware is affected by the logical topology of the network over which they propagate. We consider a...
Moez Draief, Ayalvadi J. Ganesh, Laurent Massouli&...
ASAP
2005
IEEE
96views Hardware» more  ASAP 2005»
14 years 2 months ago
On-Chip Lookup Tables for Fast Symmetric-Key Encryption
On public communication networks such as the Internet, data confidentiality can be provided by symmetric-key ciphers. One of the most common operations used in symmetric-key ciphe...
A. Murat Fiskiran, Ruby B. Lee
DATE
2005
IEEE
153views Hardware» more  DATE 2005»
14 years 2 months ago
Accurate Reliability Evaluation and Enhancement via Probabilistic Transfer Matrices
Soft errors are an increasingly serious problem for logic circuits. To estimate the effects of soft errors on such circuits, we develop a general computational framework based on ...
Smita Krishnaswamy, George F. Viamontes, Igor L. M...
ESCIENCE
2005
IEEE
14 years 2 months ago
Experiences with GRIA - Industrial Applications on a Web Services Grid
The GRIA project set out to make the Grid usable by industry. The GRIA middleware is based on Web Services, and designed to meet the needs of industry for security and business-to...
Mike Surridge, Steve Taylor, David De Roure, Ed Za...
HICSS
2005
IEEE
151views Biometrics» more  HICSS 2005»
14 years 2 months ago
Inheritance in the Presence of Asynchronous Method Calls
— This paper considers a formal object-oriented model for distributed computing. Object orientation appears as a leading framework for concurrent and distributed systems. However...
Einar Broch Johnsen, Olaf Owe