Sciweavers

4330 search results - page 777 / 866
» Analyzing security architectures
Sort
View
141
Voted
CORR
2010
Springer
150views Education» more  CORR 2010»
15 years 3 months ago
Boosting Multi-Core Reachability Performance with Shared Hash Tables
Abstract--This paper focuses on data structures for multicore reachability, which is a key component in model checking algorithms and other verification methods. A cornerstone of a...
Alfons Laarman, Jaco van de Pol, Michael Weber 000...
131
Voted
CORR
2008
Springer
89views Education» more  CORR 2008»
15 years 3 months ago
Information Theoretic Operating Regimes of Large Wireless Networks
In analyzing the point-to-point wireless channel, insights about two qualitatively different operating regimes-bandwidth- and power-limited--have proven indispensable in the design...
Ayfer Özgür, Ramesh Johari, David N. C. ...
COMCOM
2006
115views more  COMCOM 2006»
15 years 3 months ago
IPv6 deployment: Real time applications and QoS aspects
This paper gives an overview of the issues related to the QoS mechanisms under IPv6 and the transition of applications to the new Internet protocol. We describe the implementation...
Christos Bouras, Apostolos Gkamas, Dimitris Primpa...
119
Voted
COMPUTER
2006
98views more  COMPUTER 2006»
15 years 3 months ago
Componentization: The Visitor Example
: In software design, laziness is a virtue: it's better to reuse than to redo. Design patterns are a good illustration. Patterns, a major advance in software architecture, pro...
Bertrand Meyer, Karine Arnout
148
Voted
DPD
2006
98views more  DPD 2006»
15 years 3 months ago
GRACE-based joins on active storage devices
Contemporary long-term storage devices feature powerful embedded processors and sizeable memory buffers. Active Storage Devices (ASD) is the hard disk technology that makes use of ...
Vassilis Stoumpos, Alex Delis