Sciweavers

1063 search results - page 66 / 213
» Order and Negation as Failure
Sort
View
TON
1998
93views more  TON 1998»
13 years 9 months ago
An evaluation of flow control in group communication
Abstract— Group communication services have been successfully used to construct applications with high availability, dependability, and real-time responsiveness requirements. Flo...
Shivakant Mishra, Lei Wu
IPPS
2010
IEEE
13 years 8 months ago
J2EE instrumentation for software aging root cause application component determination with AspectJ
Unplanned system outages have a negative impact on company revenues and image. While the last decades have seen a lot of efforts from industry and academia to avoid them, they stil...
Javier Alonso, Jordi Torres, Josep Lluis Berral, R...
MICRO
2010
IEEE
145views Hardware» more  MICRO 2010»
13 years 7 months ago
Combating Aging with the Colt Duty Cycle Equalizer
Bias temperature instability, hot-carrier injection, and gate-oxide wearout will cause severe lifetime degradation in the performance and the reliability of future CMOS devices. Th...
Erika Gunadi, Abhishek A. Sinkar, Nam Sung Kim, Mi...
CORR
2011
Springer
186views Education» more  CORR 2011»
13 years 5 months ago
A Goal-Directed Implementation of Query Answering for Hybrid MKNF Knowledge Bases
Ontologies and rules are usually loosely coupled in knowledge representation formalisms. In fact, ontologies use open-world reasoning while the leading semantics for rules use non...
Ana Sofia Gomes, José Júlio Alferes,...
IJNSEC
2011
232views more  IJNSEC 2011»
13 years 5 months ago
Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks
The detection and isolation of compromised nodes in wireless sensor networks is a difficult task. However, failure to identify and isolate compromised nodes results in significan...
Garth V. Crosby, Lance Hester, Niki Pissinou