Sciweavers

390 search results - page 4 / 78
» Use It or Lose It
Sort
View
IAT
2009
IEEE
14 years 2 months ago
Creating Incentives to Prevent Intentional Execution Failures
—When information or control in a multiagent system is private to the agents, they may misreport this information or refuse to execute an agreed outcome, in order to change the r...
Yingqian Zhang, Mathijs de Weerdt
ISCA
2003
IEEE
96views Hardware» more  ISCA 2003»
14 years 29 days ago
Parallelism in the Front-End
As processor back-ends get more aggressive, front-ends will have to scale as well. Although the back-ends of superscalar processors have continued to become more parallel, the fro...
Paramjit S. Oberoi, Gurindar S. Sohi
PLDI
1998
ACM
13 years 12 months ago
A Study of Dead Data Members in C++ Applications
Object-oriented applications may contain data members that can be removed from the application without a ecting program behavior. Such \dead" data members may occur due to un...
Peter F. Sweeney, Frank Tip
ICCSA
2004
Springer
14 years 1 months ago
Practical Digital Signature Generation Using Biometrics
Abstract. It is desirable to generate a digital signature using biometrics but not practicable because of its inaccurate measuring and potential hill-climbing attacks, without usin...
Taekyoung Kwon, Jaeil Lee
CCS
1999
ACM
13 years 12 months ago
Using Smartcards to Secure a Personalized Gambling Device
We introduce a technique for using an untrusted device, such as a hand-held personal digital assistant or a laptop to perform real nancial transactions without a network. We utili...
William Aiello, Aviel D. Rubin, Martin Strauss