Sciweavers

206 search results - page 14 / 42
» Sharing in the Weak Lambda-Calculus
Sort
View
ACTA
2011
13 years 5 months ago
Nonatomic dual bakery algorithm with bounded tokens
A simple mutual exclusion algorithm is presented that only uses nonatomic shared variables of bounded size, and that satisfies bounded overtaking. When the shared variables behave...
Alex A. Aravind, Wim H. Hesselink
CORR
2010
Springer
136views Education» more  CORR 2010»
13 years 11 months ago
On the Sets of Real Numbers Recognized by Finite Automata in Multiple Bases
This article studies the expressive power of finite automata recognizing sets of real numbers encoded in positional notation. We consider Muller automata as well as the restricted ...
Bernard Boigelot, Julien Brusten, Véronique...
DC
2010
13 years 11 months ago
Adaptive progress: a gracefully-degrading liveness property
We introduce a simple liveness property for shared object implementations that is gracefully degrading depending on the degree of synchrony in each run. This property, called adapt...
Marcos Kawazoe Aguilera, Sam Toueg
ERSA
2007
108views Hardware» more  ERSA 2007»
14 years 10 days ago
Performance Evaluation of Two Allocation Schemes for Combinatorial Group Testing Fault Isolation
- Two fault isolation approaches based on Combinatorial Group Testing (CGT) are presented. Although they both share the basic principle of grouping suspect resources into subgroups...
Rawad N. Al-Haddad, Carthik A. Sharma, Ronald F. D...
DAC
1999
ACM
14 years 12 months ago
Robust FPGA Intellectual Property Protection Through Multiple Small Watermarks
A number of researchers have proposed using digital marks to provide ownership identification for intellectual property. Many of these techniques share three specific weaknesses: ...
John Lach, William H. Mangione-Smith, Miodrag Potk...