Sciweavers

3052 search results - page 86 / 611
» Weakly Distributive Domains
Sort
View
CSCLP
2006
Springer
15 years 7 months ago
Distributed Forward Checking May Lie for Privacy
DisFC is an ABT-like algorithm that, instead of sending the value taken by the high priority agent, it sends the domain of the low priority agent that is compatible with that value...
Ismel Brito, Pedro Meseguer
ETFA
2006
IEEE
15 years 10 months ago
DSAAR: A Distributed Software Architecture for Autonomous Robots
— This paper describes the DSAAR architecture, which aims the fast development and prototyping of multi-robot systems and it is based on Linux inter-process communication (IPC) m...
Pedro F. Santana, Vasco Santos, José Barata
ATVA
2008
Springer
115views Hardware» more  ATVA 2008»
15 years 6 months ago
Authentication Revisited: Flaw or Not, the Recursive Authentication Protocol
Authentication and secrecy have been widely investigated in security protocols. They are closely related to each other and variants of definitions have been proposed, which focus o...
Guoqiang Li, Mizuhito Ogawa
DAC
2006
ACM
15 years 10 months ago
Hierarchical power distribution and power management scheme for a single chip mobile processor
A hierarchical power distribution methodology that enables more than dozen power domains in a chip and a power management scheme using 20 power domains are described. This method ...
Toshihiro Hattori, Takahiro Irita, Masayuki Ito, E...
91
Voted
SAC
2010
ACM
15 years 9 months ago
Box consistency through adaptive shaving
The canonical algorithm to enforce box consistency over a constraint relies on a dichotomic process to isolate the leftmost and rightmost solutions. We identify some weaknesses of...
Alexandre Goldsztejn, Frédéric Goual...