Sciweavers

1891 search results - page 240 / 379
» Constrained Subspace Modelling
Sort
View
122
Voted
ICSM
2007
IEEE
15 years 9 months ago
On the prediction of the evolution of libre software projects
Libre (free / open source) software development is a complex phenomenon. Many actors (core developers, casual contributors, bug reporters, patch submitters, users, etc.), in many ...
Israel Herraiz, Jesús M. González-Ba...
SAT
2007
Springer
184views Hardware» more  SAT 2007»
15 years 8 months ago
Circuit Based Encoding of CNF Formula
In this paper a new circuit sat based encoding of boolean formula is proposed. It makes an original use of the concept of restrictive models introduced by Boufkhad to polynomially ...
Gilles Audemard, Lakhdar Sais
112
Voted
CHES
2003
Springer
100views Cryptology» more  CHES 2003»
15 years 7 months ago
Multi-channel Attacks
We introduce multi-channel attacks, i.e., side-channel attacks which utilize multiple side-channels such as power and EM simultaneously. We propose an adversarial model which combi...
Dakshi Agrawal, Josyula R. Rao, Pankaj Rohatgi
126
Voted
ATAL
2000
Springer
15 years 7 months ago
Plan Analysis for Autonomous Sociological Agents
Abstract. This paper is concerned with the problem of how effective social interaction arises from individual social action and mind. The need to study the individual social mind s...
Michael Luck, Mark d'Inverno
FAC
2008
97views more  FAC 2008»
15 years 2 months ago
A functional formalization of on chip communications
This paper presents a formal model and a systematic approach to the validation of communication tures at a high level of abstraction. This model is described mathematically by a fu...
Julien Schmaltz, Dominique Borrione