Sciweavers

1002 search results - page 143 / 201
» Reasoning about Object Structures Using Ownership
Sort
View
CCS
2008
ACM
13 years 12 months ago
Minimal backups of cryptographic protocol runs
As cryptographic protocols execute they accumulate information such as values and keys, and evidence of properties about this information. As execution proceeds, new information b...
Jay A. McCarthy, Shriram Krishnamurthi
GI
2004
Springer
14 years 3 months ago
Reliability study of an embedded operating system for industrial applications
: Critical industrial applications or fault tolerant applications need for operating systems (OS) which guarantee a correct and safe behaviour despite the appearance of errors. In ...
Juan Pardo, José Carlos Campelo, Juan Jos&e...
COMPSAC
2004
IEEE
14 years 1 months ago
Robustness Study of an Embedded Operating System for Industrial Applications
Critical industrial applications or fault tolerant applications need for operating systems (OS) which guarantee a correct and safe behaviour in spite of the appearance of errors. ...
Juan Pardo, José Carlos Campelo, Juan Jos&e...
WWW
2003
ACM
14 years 10 months ago
Piazza: data management infrastructure for semantic web applications
The Semantic Web envisions a World Wide Web in which data is described with rich semantics and applications can pose complex queries. To this point, researchers have defined new l...
Alon Y. Halevy, Zachary G. Ives, Peter Mork, Igor ...
GECCO
2005
Springer
120views Optimization» more  GECCO 2005»
14 years 3 months ago
Evolving visually guided agents in an ambiguous virtual world
The fundamental challenge faced by any visual system within natural environments is the ambiguity caused by the fact that light that falls on the system’s sensors conflates mult...
Ehud Schlessinger, Peter J. Bentley, R. Beau Lotto