Sciweavers

696 search results - page 122 / 140
» Explaining abstract counterexamples
Sort
View
IJSNET
2010
117views more  IJSNET 2010»
13 years 2 months ago
Reaction-diffusion based autonomous control of wireless sensor networks
Abstract: Taking into account requirements of sensor networks, we need fully-distributed and selforganising control mechanisms which are scalable to the size of a network, robust t...
Katsuya Hyodo, Naoki Wakamiya, Etsushi Nakaguchi, ...
SIAMREV
2010
119views more  SIAMREV 2010»
13 years 2 months ago
From Functional Analysis to Iterative Methods
We examine condition numbers, preconditioners, and iterative methods for finite element discretizations of coercive PDEs in the context of the fundamental solvability result, the L...
Robert C. Kirby
TCIAIG
2010
13 years 2 months ago
The Parametrized Probabilistic Finite-State Transducer Probe Game Player Fingerprint Model
Abstract--Fingerprinting operators generate functional signatures of game players and are useful for their automated analysis independent of representation or encoding. The theory ...
Jeffrey Tsang
FDTC
2011
Springer
267views Cryptology» more  FDTC 2011»
12 years 7 months ago
An In-depth and Black-box Characterization of the Effects of Clock Glitches on 8-bit MCUs
Abstract—The literature about fault analysis typically describes fault injection mechanisms, e.g. glitches and lasers, and cryptanalytic techniques to exploit faults based on som...
Josep Balasch, Benedikt Gierlichs, Ingrid Verbauwh...
ECOOPW
1998
Springer
13 years 11 months ago
Mapping Business Processes to Software Design Artifacts
This paper explains the structure of a project repository, which enables you to trace business processes and business rules to the architecture and design of the software system. T...
Pavel Hruby