Sciweavers

3155 search results - page 137 / 631
» How Are You Doing
Sort
View
ARGMAS
2005
Springer
14 years 1 months ago
Argumentation-Based Multi-agent Dialogues for Deliberation
This paper presents an argumentation-based approach to deliberation, the process by which two or more agents reach a consensus on a course of action. The kind of deliberation that ...
Yuqing Tang, Simon Parsons
CP
2003
Springer
14 years 1 months ago
Identifying Inconsistent CSPs by Relaxation
How do we identify inconsistent CSPs quickly? This paper presents relaxation as one possible method; showing how we can generate relaxed CSPs which are easier to prove inconsistent...
Tomas Eric Nordlander, Ken N. Brown, Derek H. Slee...
CCS
1998
ACM
14 years 3 days ago
Cryptanalysis of Microsoft's Point-to-Point Tunneling Protocol (PPTP)
The Point-to-Point Tunneling Protocol (PPTP) is used to secure PPP connections over TCP/IP links. In this paper we analyze Microsoft's Windows NT implementation of PPTP. We s...
Bruce Schneier, Mudge
ISSS
1996
IEEE
87views Hardware» more  ISSS 1996»
14 years 1 days ago
Breakpoints and Breakpoint Detection in Source Level Emulation
In this paper we discuss, what breakpoints in Source Level Emulationa are, how we can work with them and how we have to change the cicuit generated by high level synthesis to do s...
Gernot Koch, Udo Kebschull, Wolfgang Rosenstiel
ECOOP
2007
Springer
13 years 11 months ago
Why Don't People Use Refactoring Tools?
Tools that perform refactoring are currently under-utilized by programmers. As more advanced refactoring tools are designed, a great chasm widens between how the tools must be use...
Emerson R. Murphy-Hill, Andrew P. Black