Sciweavers

9145 search results - page 1644 / 1829
» Description Logic Systems
Sort
View
RTA
2009
Springer
14 years 4 months ago
YAPA: A Generic Tool for Computing Intruder Knowledge
Reasoning about the knowledge of an attacker is a necessary step in many formal analyses of security protocols. In the framework of the applied pi calculus, as in similar languages...
Mathieu Baudet, Véronique Cortier, St&eacut...
SLIP
2009
ACM
14 years 4 months ago
Honeycomb-structured computational interconnects and their scalable extension to spherical domains
The present paper is part of a larger effort to redesign, from the ground up, the best possible interconnect topologies for switchless multiprocessor computer systems. We focus he...
Joseph B. Cessna, Thomas R. Bewley
AINA
2008
IEEE
14 years 4 months ago
Multi-Token Distributed Mutual Exclusion Algorithm
This paper is a contribution to the inception of multiple tokens in solving distributed mutual exclusion problem. The proposed algorithm is based on the token ring approach and al...
Md. Abdur Razzaque, Choong Seon Hong
ASAP
2008
IEEE
146views Hardware» more  ASAP 2008»
14 years 4 months ago
A multi-FPGA application-specific architecture for accelerating a floating point Fourier Integral Operator
Many complex systems require the use of floating point arithmetic that is exceedingly time consuming to perform on personal computers. However, floating point operators are also h...
Jason Lee, Lesley Shannon, Matthew J. Yedlin, Gary...
DATE
2008
IEEE
119views Hardware» more  DATE 2008»
14 years 4 months ago
Guiding Circuit Level Fault-Tolerance Design with Statistical Methods
In the last decade, the focus of fault-tolerance methods has tended towards circuit level modifications, such as transistor resizing, and away from expensive system level redunda...
Drew C. Ness, David J. Lilja
« Prev « First page 1644 / 1829 Last » Next »