Sciweavers

798 search results - page 107 / 160
» Comparing the expressive power of access control models
Sort
View
IFIP
2010
Springer
13 years 5 months ago
Model Checking of Concurrent Algorithms: From Java to C
Concurrent software is difficult to verify. Because the thread schedule is not controlled by the application, testing may miss defects that occur under specific thread schedules. T...
Cyrille Artho, Masami Hagiya, Watcharin Leungwatta...
ICC
2007
IEEE
123views Communications» more  ICC 2007»
14 years 4 months ago
Cross-Layer Optimization With Model-Based Parameter Exchange
— Cross-layer optimization (CLO) promises significant gains in comparison to a conventional system design, which does not allow for information exchange across layers. One of th...
Andreas Saul, Shoaib Khan, Gunther Auer, Wolfgang ...

Publication
453views
15 years 8 months ago
System Level Modeling of IEEE 802.16e Mobile WiMAX Networks: Key Issues
WiMAX has attracted a lot of attention recently in the telecommunication community including researchers, product developers and service providers. Numerous papers have been publis...
Raj Jain, Chakchai So-In, and Abdel-Karim Al Tamim...
ICC
2007
IEEE
301views Communications» more  ICC 2007»
14 years 4 months ago
Network Lifetime Optimization by Duality Approach for Multi-Source and Single-Sink Topology in Wireless Sensor Networks
—The multi-source and single-sink (MSSS) topology, in wireless sensor networks, is defined as the network topology, where all of nodes can gather, receive and transmit data to t...
Hui Wang, Yuhang Yang, Maode Ma, Xiaomin Wang
FOCS
2004
IEEE
14 years 1 months ago
On the Streaming Model Augmented with a Sorting Primitive
The need to deal with massive data sets in many practical applications has led to a growing interest in computational models appropriate for large inputs. The most important quali...
Gagan Aggarwal, Mayur Datar, Sridhar Rajagopalan, ...