Sciweavers

63 search results - page 11 / 13
» Designing what-if analysis: towards a methodology
Sort
View
CCS
2010
ACM
13 years 4 months ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...
CG
2004
Springer
14 years 26 days ago
Strategic Interactions in the TAC 2003 Supply Chain Tournament
The TAC 2003 supply-chaingame presented automated trading agents with a challenging strategic problem. Embedded within a complex stochastic environment was a pivotal strategic deci...
Joshua Estelle, Yevgeniy Vorobeychik, Michael P. W...
ICECCS
1996
IEEE
109views Hardware» more  ICECCS 1996»
13 years 11 months ago
Dynamically Reconfigurable Embedded Software - Does It Make Sense?
A dynamically reconfigurable real-time software (DRRTS) paradigm can be used effectively in the design of embedded systems to provide many major advantages over conventional softw...
David B. Stewart, Gaurav Arora
ISSS
1996
IEEE
169views Hardware» more  ISSS 1996»
13 years 11 months ago
The Use of a Virtual Instruction Set for the Software Synthesis of HW/SW Embedded Systems
The application range of the embedded computing is going to cover the majority of the market products spanning from consumer electronic, automotive, telecom and process control. F...
Alessandro Balboni, William Fornaciari, M. Vincenz...
CI
2005
86views more  CI 2005»
13 years 7 months ago
Strategic Interactions in a Supply Chain Game
The TAC 2003 supply-chain game presented automated trading agents with a challenging strategic problem. Embedded within a high-dimensional stochastic environment was a pivotal str...
Michael P. Wellman, Joshua Estelle, Satinder P. Si...