Sciweavers

9145 search results - page 1644 / 1829
» Description Logic Systems
Sort
View
129
Voted
RTA
2009
Springer
15 years 10 months ago
YAPA: A Generic Tool for Computing Intruder Knowledge
Reasoning about the knowledge of an attacker is a necessary step in many formal analyses of security protocols. In the framework of the applied pi calculus, as in similar languages...
Mathieu Baudet, Véronique Cortier, St&eacut...
114
Voted
SLIP
2009
ACM
15 years 10 months ago
Honeycomb-structured computational interconnects and their scalable extension to spherical domains
The present paper is part of a larger effort to redesign, from the ground up, the best possible interconnect topologies for switchless multiprocessor computer systems. We focus he...
Joseph B. Cessna, Thomas R. Bewley
AINA
2008
IEEE
15 years 10 months ago
Multi-Token Distributed Mutual Exclusion Algorithm
This paper is a contribution to the inception of multiple tokens in solving distributed mutual exclusion problem. The proposed algorithm is based on the token ring approach and al...
Md. Abdur Razzaque, Choong Seon Hong
142
Voted
ASAP
2008
IEEE
146views Hardware» more  ASAP 2008»
15 years 10 months ago
A multi-FPGA application-specific architecture for accelerating a floating point Fourier Integral Operator
Many complex systems require the use of floating point arithmetic that is exceedingly time consuming to perform on personal computers. However, floating point operators are also h...
Jason Lee, Lesley Shannon, Matthew J. Yedlin, Gary...
129
Voted
DATE
2008
IEEE
119views Hardware» more  DATE 2008»
15 years 10 months ago
Guiding Circuit Level Fault-Tolerance Design with Statistical Methods
In the last decade, the focus of fault-tolerance methods has tended towards circuit level modifications, such as transistor resizing, and away from expensive system level redunda...
Drew C. Ness, David J. Lilja
« Prev « First page 1644 / 1829 Last » Next »