Sciweavers

1179 search results - page 96 / 236
» Relative Timing Based Verification of Timed Circuits and Sys...
Sort
View
CANS
2009
Springer
136views Cryptology» more  CANS 2009»
15 years 10 months ago
Verifying Anonymous Credential Systems in Applied Pi Calculus
Abstract. Anonymous credentials are widely used to certify properties of a credential owner or to support the owner to demand valuable services, while hiding the user’s identity ...
Xiangxi Li, Yu Zhang, Yuxin Deng
EUROMICRO
1999
IEEE
15 years 8 months ago
Software Synthesis for System Level Design Using Process Execution Trees
Software synthesis for system level design languages becomes feasible because the current technology, pricing and application trends will most likely alleviate the industrial empha...
Leo J. van Bokhoven, Jeroen Voeten, Marc Geilen
186
Voted
GECCO
2007
Springer
142views Optimization» more  GECCO 2007»
15 years 10 months ago
Simulations of egoistic and altruistic behaviors using the vidya multiagent system platform
This paper investigates the impacts of individual egoistic and altruistic behaviors in a virtual society built upon the Vidya game, used here as the social simulation and Multiage...
Marcelo Souza Pita, Fernando Buarque de Lima Neto
125
Voted
AINA
2005
IEEE
15 years 9 months ago
An Architecture for Automated QoS Resolution in Wireless Systems
: The pervasive nature of mobile and wireless systems has led to increased concerns over Quality of Service (QoS). In the prevailing models for QoS management, QoS resolution is ac...
Behzad Bordbar, Rachid Anane
CASES
2010
ACM
15 years 2 months ago
Instruction selection by graph transformation
Common generated instruction selections are based on tree pattern matching, but modern and custom architectures feature instructions, which cannot be covered by trees. To overcome...
Sebastian Buchwald, Andreas Zwinkau