Sciweavers

154 search results - page 15 / 31
» A Theory of Runtime Enforcement, with Results
Sort
View
NETWORKING
2004
13 years 9 months ago
Stabilized Edge-to-Edge Aggregate Flow Control
In this paper, we present a distributed flow control scheme which achieves weighted max-min fair bandwidth allocation among all source-destination pairs on a per-aggregate basis wi...
Hyung-Keun Ryu, Jeong-woo Cho, Song Chong
FOAL
2009
ACM
14 years 2 months ago
A type system for functional traversal-based aspects
We present a programming language model of the ideas behind Functional Adaptive Programming (AP-F) and our Java implementation, DemeterF. Computation in AP-F is encapsulated in se...
Bryan Chadwick, Karl J. Lieberherr
ICCSA
2004
Springer
14 years 1 months ago
Searching for 2D Spatial Network Holes
Research involving different forms of networks, such as internet networks, social networks, and cellular networks, has increasingly become an important field of study. From this wo...
Femke Reitsma, Shane Engel
ICPP
2008
IEEE
14 years 2 months ago
Scalable Techniques for Transparent Privatization in Software Transactional Memory
—We address the recently recognized privatization problem in software transactional memory (STM) runtimes, and introduce the notion of partially visible reads (PVRs) to heuristic...
Virendra J. Marathe, Michael F. Spear, Michael L. ...
AINA
2006
IEEE
14 years 2 months ago
Model-based Management of Embedded Service Systems - An Applied Approach
The automatic integration of devices into dynamic, automatically configured networks alone does not take advantage of the entire potential of Service Oriented Architectures (SOA)...
Stefan Illner, Heiko Krumm, Ingo Lück, Andre ...