Sciweavers

232 search results - page 46 / 47
» Implementing logical connectives in constraint programming
Sort
View
AAAI
1998
13 years 8 months ago
An Expert System for Alarm System Planning
This paper discusses the design and implementation of ESSPL, an expert system which generates security plans for alarm systems (Figure 1). Security planning is the task of determi...
Akira Tsurushima, Kenji Urushima, Daigo Sakata, Hi...
ASPDAC
2005
ACM
97views Hardware» more  ASPDAC 2005»
14 years 1 months ago
Opportunities and challenges for better than worst-case design
The progressive trend of fabrication technologies towards the nanometer regime has created a number of new physical design challenges for computer architects. Design complexity, u...
Todd M. Austin, Valeria Bertacco, David Blaauw, Tr...
ECOOP
2005
Springer
14 years 1 months ago
The Role of Design Information in Software Evolution
Software modeling has received a lot a of attention in the last decade and now is an important support for the design process. Actually, the design process is very important to the...
Walter Cazzola, Sonia Pini, Massimo Ancona
AAMAS
2005
Springer
13 years 7 months ago
Argumentation and the Dynamics of Warranted Beliefs in Changing Environments
One of the most difficult problems in Multi-Agent Systems (MAS) involves representing the knowledge and beliefs of an agent which performs its tasks in a dynamic environment. New p...
Marcela Capobianco, Carlos Iván Chesñ...
ISLPED
2003
ACM
197views Hardware» more  ISLPED 2003»
14 years 22 days ago
Analyzing the energy consumption of security protocols
Security is critical to a wide range of wireless data applications and services. While several security mechanisms and protocols have been developed in the context of the wired In...
Nachiketh R. Potlapally, Srivaths Ravi, Anand Ragh...