Sciweavers

3481 search results - page 669 / 697
» Higher-Order Logic Programming as Constraint Logic Programmi...
Sort
View
EMSOFT
2004
Springer
14 years 1 months ago
A model-based approach to integrating security policies for embedded devices
Embedded devices like smart cards can now run multiple interacting applications. A particular challenge in this domain is to dynamically integrate diverse security policies. In th...
Michael McDougall, Rajeev Alur, Carl A. Gunter
FPGA
2003
ACM
138views FPGA» more  FPGA 2003»
14 years 24 days ago
Automatic transistor and physical design of FPGA tiles from an architectural specification
One of the most difficult and time-consuming steps in the creation of an FPGA is its transistor-level design and physical layout. Modern commercial FPGAs typically consume anywher...
Ketan Padalia, Ryan Fung, Mark Bourgeault, Aaron E...
AGENTS
2001
Springer
14 years 3 days ago
A fuzzy model of reputation in multi-agent systems
Agents are intended to interact in open systems where the knowledge about others (reputation) is incomplete and uncertain. Also, this knowledge about other agents is subjective si...
Javier Carbo Rubiera, José M. Molina L&oacu...
ARVLSI
1997
IEEE
104views VLSI» more  ARVLSI 1997»
13 years 11 months ago
A High-Speed Asynchronous Decompression Circuit for Embedded Processors
This paper describes the architecture and implementation of a high-speed decompression engine for embedded processors. The engine is targeted to processors where embedded programs...
Martin Benes, Andrew Wolfe, Steven M. Nowick
ACSC
2004
IEEE
13 years 11 months ago
On Evolving Fixed Pattern Strategies for Iterated Prisoner's Dilemma
Table 1 shows the payoff to player one. The same matrix also holds for player two. Player one can gain the maximum 5 points (T = 5) by defection if player two cooperates. However,...
Daniel Jang, Peter A. Whigham, Grant Dick