Sciweavers

165 search results - page 15 / 33
» Constraints: The Ties that Bind
Sort
View
WETICE
1998
IEEE
13 years 12 months ago
The Problem with Multiple Roots in Web Browsers - Certificate Masquerading
Much work is going into securing the public key infrastructure (PKI). Various models for trust exist; Pretty Good Privacy (PGP) and the Progressive-Constraint Trust model are exam...
James M. Hayes
ASPDAC
2009
ACM
127views Hardware» more  ASPDAC 2009»
14 years 2 months ago
Timing driven power gating in high-level synthesis
- The power gating technique is useful in reducing standby leakage current, but it increases the gate delay. For a functional unit, its maximum allowable delay (for a target clock ...
Shih-Hsu Huang, Chun-Hua Cheng
CMOT
2004
83views more  CMOT 2004»
13 years 7 months ago
Networks, Fields and Organizations: Micro-Dynamics, Scale and Cohesive Embeddings
Social action is situated in fields that are simultaneously composed of interpersonal ties and relations among organizations, which are both usefully characterized as social netwo...
Douglas R. White, Jason Owen-Smith, James Moody, W...
KI
2002
Springer
13 years 7 months ago
Integrating Function Application in State-Based Planning
We present an extension of state-based planning from traditional Strips to function application, allowing to express operator effects as updates. As proposed in PDDL, fluent variab...
Ute Schmid, Marina Müller, Fritz Wysotzki
PODS
1999
ACM
160views Database» more  PODS 1999»
13 years 12 months ago
Queries with Incomplete Answers over Semistructured Data
Semistructured data occur in situations where information lacks a homogeneous structure and is incomplete. Yet, up to now the incompleteness of information has not been re ected b...
Yaron Kanza, Werner Nutt, Yehoshua Sagiv