Sciweavers

181 search results - page 33 / 37
» It's About Time: Real-Time Logics Reviewed
Sort
View
GI
2009
Springer
13 years 8 months ago
Service-oriented Event Assessment - Closing the Gap of IT Security Compliance Management
: Frequently, Security Monitoring is equated with network intrusion detection. However, Security Monitoring has a much broader scope. It also comprises detection of insider attacks...
Frederic Majer, Martin Nussbaumer, Dieter Riexinge...
CSL
2010
Springer
13 years 12 months ago
From Feasible Proofs to Feasible Computations
We shall discuss several situations in which it is possible to extract from a proof, be it a proof in a first-order theory or a propositional proof, some feasible computational inf...
Jan Krajícek
ICCAD
2005
IEEE
87views Hardware» more  ICCAD 2005»
14 years 7 months ago
Statistical technology mapping for parametric yield
The increasing variability of process parameters leads to substantial parametric yield losses due to timing and leakage power constraints. Leakage power is especially affected by ...
Ashish Kumar Singh, Murari Mani, Michael Orshansky
AI
2007
Springer
13 years 11 months ago
Audiences in argumentation frameworks
Although reasoning about what is the case has been the historic focus of logic, reasoning about what should be done is an equally important capacity for an intelligent agent. Reas...
Trevor J. M. Bench-Capon, Sylvie Doutre, Paul E. D...
TMC
2012
12 years 1 months ago
Message Drop and Scheduling in DTNs: Theory and Practice
Abstract—In order to achieve data delivery in Delay Tolerant Networks (DTN), researchers have proposed the use of store-carryand-forward protocols: a node there may store a messa...
Amir Krifa, Chadi Barakat, Thrasyvoulos Spyropoulo...