Sciweavers

182 search results - page 30 / 37
» Enforcing Robust Declassification
Sort
View
CP
2003
Springer
14 years 20 days ago
Solving Finite Domain Constraint Hierarchies by Local Consistency and Tree Search
We provide a reformulation of the constraint hierarchies (CHs) framework based on the notion of error indicators. Adapting the generalized view of local consistency in semiring-ba...
Stefano Bistarelli, Philippe Codognet, Kin Chuen H...
COOPIS
2002
IEEE
14 years 12 days ago
The Design and Performance of the jRate Real-Time Java Implementation
Over 90 percent of all microprocessors are now used for realtime and embedded applications. Since the behavior of these applications is often constrained by the physical world, it...
Angelo Corsaro, Douglas C. Schmidt
CCS
1994
ACM
13 years 11 months ago
Protocol Failure in the Escrowed Encryption Standard
The Escrowed Encryption Standard (EES) defines a US Government family of cryptographic processors, popularly known as "Clipper" chips, intended to protect unclassified g...
Matt Blaze
FIMH
2009
Springer
13 years 11 months ago
Atrioventricular Blood Flow Simulation Based on Patient-Specific Data
Abstract. We propose a new framework for simulating blood flow inside the heart, usable with geometric models of the heart from patientspecific data. The method is geared toward re...
Viorel Mihalef, Dimitris N. Metaxas, Mark Sussman,...
HYBRID
2007
Springer
13 years 11 months ago
On Self-triggered Full-Information H-Infinity Controllers
Abstract. A self-triggered control task is one in which the task determines its next release time. It has been conjectured that self-triggering can relax the requirements on a real...
Michael D. Lemmon, Thidapat Chantem, Xiaobo Sharon...