Sciweavers

2038 search results - page 33 / 408
» Loops under Strategies
Sort
View
SYNTHESE
2010
130views more  SYNTHESE 2010»
13 years 6 months ago
Belief ascription under bounded resources
There exists a considerable body of work on epistemic logics for resource-bounded reasoners. In this paper, we concentrate on a less studied aspect of resource-bounded reasoning, n...
Natasha Alechina, Brian Logan
DATE
2007
IEEE
157views Hardware» more  DATE 2007»
14 years 1 months ago
Energy evaluation of software implementations of block ciphers under memory constraints
Software implementations of modern block ciphers often require large lookup tables along with code size increasing optimizations like loop unrolling to reach peak performance on g...
Johann Großschädl, Stefan Tillich, Chri...
USENIX
1994
13 years 8 months ago
Wux: UNIX Tools under Windows
Wux is a port of Unix tools to the Microsoft Windows environment. It is based on a library providing a Unixcompatible set of system calls on top of Windows. Unix-derived tools run...
Diomidis Spinellis
P2P
2006
IEEE
153views Communications» more  P2P 2006»
14 years 1 months ago
Internet-Scale Storage Systems under Churn -- A Study of the Steady-State using Markov Models
Content storage in a distributed collaborative environment uses redundancy for better resilience and thus provides good availability and durability. In a peer-to-peer environment,...
Anwitaman Datta, Karl Aberer
DATE
2005
IEEE
109views Hardware» more  DATE 2005»
14 years 1 months ago
Systematic Analysis of Active Clock Deskewing Systems Using Control Theory
— A formal methodology for the analysis of a closed loop clock distribution and active deskewing network is proposed. In this paper an active clock distribution and deskewing net...
Vinil Varghese, Tom Chen, Peter Michael Young