Sciweavers

605 search results - page 75 / 121
» A strategy for efficiently verifying requirements
Sort
View
TELSYS
2002
70views more  TELSYS 2002»
13 years 8 months ago
Integrating Differentiated Services with ATM
IP in the edge and ATM in the core are commonplace in today's internetworks. The IETF has proposed a new Quality of Service (QoS) mechanism namely Differentiated Services (Dif...
Sowmya Manjanatha, Radim Bartos
IEEECIT
2010
IEEE
13 years 7 months ago
SAT: A Stream Architecture Template for Embedded Applications
- The increase of embedded applications complexity has demanded hardware more flexible while providing higher performance. Reconfigurable architectures and stream processing have b...
Qianming Yang, Nan Wu, Mei Wen, Yi He, Huayou Su, ...
IMC
2010
ACM
13 years 7 months ago
Measuring the mixing time of social graphs
Social networks provide interesting algorithmic properties that can be used to bootstrap the security of distributed systems. For example, it is widely believed that social networ...
Abedelaziz Mohaisen, Aaram Yun, Yongdae Kim
HIPC
2009
Springer
13 years 6 months ago
Group file operations for scalable tools and middleware
Group file operations are a new, intuitive idiom for tools and middleware - including parallel debuggers and runtimes, performance measurement and steering, and distributed resourc...
Michael J. Brim, Barton P. Miller
FOAL
2008
ACM
13 years 10 months ago
Incremental analysis of interference among aspects
Often, insertion of several aspects into one system is desired and in that case the problem of interference among the different aspects might arise, even if each aspect individual...
Emilia Katz, Shmuel Katz