Sciweavers

209 search results - page 32 / 42
» Establishing Persistent Identity using the Handle System
Sort
View
CSCW
2004
ACM
14 years 1 months ago
Maintaining redundancy in the coordination of medical emergencies
This paper reports from a study of Norwegian medical emergency call (AMK) centres, in which advanced radio and telephone communication technologies are handled by a team of nurses...
Aksel Tjora
ISCA
2005
IEEE
134views Hardware» more  ISCA 2005»
14 years 1 months ago
An Architecture Framework for Transparent Instruction Set Customization in Embedded Processors
Instruction set customization is an effective way to improve processor performance. Critical portions of application dataflow graphs are collapsed for accelerated execution on s...
Nathan Clark, Jason A. Blome, Michael L. Chu, Scot...
JECR
2000
114views more  JECR 2000»
13 years 7 months ago
Intelligent Agents Acting as Artificial Employees in an Electronic Market
This paper describes an agent-based electronic market system whose underlying communication and cooperation protocols establish an artificial environment with advanced features. U...
Nikos I. Karacapilidis, Pavlos Moraitis
IFM
2005
Springer
100views Formal Methods» more  IFM 2005»
14 years 1 months ago
Embedding the Stable Failures Model of CSP in PVS
We present an embedding of the stable failures model of CSP in the PVS theorem prover. Our work, extending a previous embedding of the traces model of CSP in [6], provides a platfo...
Kun Wei, James Heather
SP
2010
IEEE
190views Security Privacy» more  SP 2010»
13 years 5 months ago
Noninterference through Secure Multi-execution
A program is defined to be noninterferent if its outputs cannot be influenced by inputs at a higher security level than their own. Various researchers have demonstrated how this pr...
Dominique Devriese, Frank Piessens