Sciweavers

3224 search results - page 642 / 645
» On Checking Model Checkers
Sort
View
146
Voted
JAIR
2010
160views more  JAIR 2010»
15 years 1 months ago
Reasoning About the Transfer of Control
We present DCL-PC: a logic for reasoning about how the abilities of agents and coalitions of agents are altered by transferring control from one agent to another. The logical foun...
Wiebe van der Hoek, Dirk Walther, Michael Wooldrid...
147
Voted
MICRO
2010
IEEE
156views Hardware» more  MICRO 2010»
15 years 1 months ago
Explicit Communication and Synchronization in SARC
SARC merges cache controller and network interface functions by relying on a single hardware primitive: each access checks the tag and the state of the addressed line for possible...
Manolis Katevenis, Vassilis Papaefstathiou, Stamat...
115
Voted
GLOBECOM
2010
IEEE
15 years 19 days ago
Packet-Reliability-Based Decode-and-Forward Distributed Space-Time Shift Keying
Motivated by the recent concept of Space-Time Shift Keying (STSK), we propose a novel cooperative STSK scheme, which is capable of achieving a flexible rate-diversity tradeoff, in ...
Shinya Sugiura, Sheng Chen, Lajos Hanzo
133
Voted
SIGSOFT
2010
ACM
15 years 15 days ago
Finding latent performance bugs in systems implementations
Robust distributed systems commonly employ high-level recovery mechanisms enabling the system to recover from a wide variety of problematic environmental conditions such as node f...
Charles Edwin Killian, Karthik Nagaraj, Salman Per...
172
Voted
USS
2010
15 years 15 days ago
Toward Automated Detection of Logic Vulnerabilities in Web Applications
Web applications are the most common way to make services and data available on the Internet. Unfortunately, with the increase in the number and complexity of these applications, ...
Viktoria Felmetsger, Ludovico Cavedon, Christopher...