Sciweavers

576 search results - page 109 / 116
» Modeling Adversaries in a Logic for Security Protocol Analys...
Sort
View
IPPS
2006
IEEE
14 years 1 months ago
Analysis of checksum-based execution schemes for pipelined processors
The performance requirements for contemporary microprocessors are increasing as rapidly as their number of applications grows. By accelerating the clock, performance can be gained...
Bernhard Fechner
IEEESCC
2008
IEEE
14 years 1 months ago
Byzantine Fault Tolerant Coordination for Web Services Business Activities
In this paper, we present a comprehensive study on the threats towards the coordination services for Web services business activities and explore the most optimal solution to miti...
Wenbing Zhao, Honglei Zhang
WSFM
2007
Springer
14 years 1 months ago
Towards a Theory of Web Service Choreographies
A fundamental promise of service oriented architecture (SOA) lies in the ease of integrating sharable information, processes, and other resources through interactions among the sha...
Jianwen Su, Tevfik Bultan, Xiang Fu, Xiangpeng Zha...
AIEDU
2007
108views more  AIEDU 2007»
13 years 7 months ago
Explicit Reflection in Prolog-Tutor
This paper describes a reflection-based approach for open learner modeling (OLM). Tutoring dialogues are used by learners to explicitly reveal their own knowledge state to themselv...
Joséphine M. P. Tchétagni, Roger Nka...
PASTE
2010
ACM
14 years 17 days ago
Opportunities for concurrent dynamic analysis with explicit inter-core communication
Multicore is now the dominant processor trend, and the number of cores is rapidly increasing. The paradigm shift to multicore forces the redesign of the software stack, which incl...
Jungwoo Ha, Stephen P. Crago