Sciweavers

1451 search results - page 123 / 291
» Case Studies in Model Manipulation for Scientific Computing
Sort
View
FUIN
2007
104views more  FUIN 2007»
15 years 4 months ago
Modelling and Checking Timed Authentication of Security Protocols
In this paper we offer a novel methodology for verifying correctness of (timed) security protocols. The idea consists in computing the time of a correct execution of a session and ...
Gizela Jakubowska, Wojciech Penczek
180
Voted
ASPLOS
1994
ACM
15 years 8 months ago
Compiler Optimizations for Improving Data Locality
In the past decade, processor speed has become significantly faster than memory speed. Small, fast cache memories are designed to overcome this discrepancy, but they are only effe...
Steve Carr, Kathryn S. McKinley, Chau-Wen Tseng
ICCCN
2007
IEEE
15 years 11 months ago
Optimization Models for Streaming in Multihop Wireless Networks
— Wireless spectrum is a scare resource, while media streaming usually requires high end-to-end bandwidth. Media streaming in wireless ad hoc networks is therefore a particularly...
Zongpeng Li, Baochun Li, Mea Wang
CORR
2010
Springer
118views Education» more  CORR 2010»
15 years 1 months ago
Estimating Probabilities in Recommendation Systems
Modeling ranked data is an essential component in a number of important applications including recommendation systems and websearch. In many cases, judges omit preference among un...
Mingxuan Sun, Guy Lebanon, Paul Kidwell
CAV
2004
Springer
202views Hardware» more  CAV 2004»
15 years 10 months ago
Statistical Model Checking of Black-Box Probabilistic Systems
Abstract. We propose a new statistical approach to analyzing stochastic systems against specifications given in a sublogic of continuous stochastic logic (CSL). Unlike past numeri...
Koushik Sen, Mahesh Viswanathan, Gul Agha