Sciweavers

893 search results - page 169 / 179
» Descent Theory for Schemes
Sort
View
ASM
2003
ASM
14 years 19 days ago
A Framework for Proving Contract-Equipped Classes
r in: Abstract State Machines 2003 — Advances in Theory and Applications, Proc. 10th International Workshop, Taormina, Italy, March 3-7, 2003, eds. Egon Boerger, Angelo Gargantin...
Bertrand Meyer
SIGMETRICS
2010
ACM
233views Hardware» more  SIGMETRICS 2010»
14 years 7 days ago
Incentivizing peer-assisted services: a fluid shapley value approach
A new generation of content delivery networks for live streaming, video on demand, and software updates takes advantage of a peer-to-peer architecture to reduce their operating co...
Vishal Misra, Stratis Ioannidis, Augustin Chaintre...
LCTRTS
2010
Springer
14 years 5 days ago
Cache vulnerability equations for protecting data in embedded processor caches from soft errors
Continuous technology scaling has brought us to a point, where transistors have become extremely susceptible to cosmic radiation strikes, or soft errors. Inside the processor, cac...
Aviral Shrivastava, Jongeun Lee, Reiley Jeyapaul
HUC
2009
Springer
14 years 16 hour ago
Simultaneous localization and mapping for pedestrians using only foot-mounted inertial sensors
In this paper we describe a new Bayesian estimation approach for simultaneous mapping and localization for pedestrians based on odometry with foot mounted inertial sensors. When s...
Patrick Robertson, Michael Angermann, Bernhard Kra...
KESAMSTA
2009
Springer
13 years 12 months ago
Structural Changes in an Email-Based Social Network
ent Artificial Immune Systems (MAAIS) for Intrusion Detection: Abstraction from Danger Theory Chung-Ming Ou, C.R. Ou Ants-like Agents: a Model and Analysis Based on Natural Ants Be...
Krzysztof Juszczyszyn, Katarzyna Musial