Sciweavers

3937 search results - page 567 / 788
» Questioning Ubiquitous Computing
Sort
View
MMMACNS
2005
Springer
15 years 8 months ago
Models and Analysis of Active Worm Defense
Abstract. The recent proliferation of Internet worms has raised questions about defensive measures. To date most techniques proposed are passive, in-so-far as they attempt to block...
David M. Nicol, Michael Liljenstam
TACAS
2005
Springer
108views Algorithms» more  TACAS 2005»
15 years 8 months ago
On Some Transformation Invariants Under Retiming and Resynthesis
Transformations using retiming and resynthesis operations are the most important and practical (if not the only) techniques used in optimizing synchronous hardware systems. Althoug...
Jie-Hong Roland Jiang
155
Voted
ASIAN
2004
Springer
180views Algorithms» more  ASIAN 2004»
15 years 8 months ago
Counting by Coin Tossings
Abstract. This text is an informal review of several randomized algorithms that have appeared over the past two decades and have proved instrumental in extracting efficiently quant...
Philippe Flajolet
SIGECOM
2003
ACM
125views ECommerce» more  SIGECOM 2003»
15 years 7 months ago
Complexity of determining nonemptiness of the core
Coalition formation is a key problem in automated negotiation among self-interested agents, and other multiagent applications. A coalition of agents can sometimes accomplish thing...
Vincent Conitzer, Tuomas Sandholm
EMSOFT
2001
Springer
15 years 7 months ago
Interface Theories for Component-Based Design
Abstract. We classify component-based models of computation into component models and interface models. A component model speci es for each component how the component behaves in a...
Luca de Alfaro, Thomas A. Henzinger