Sciweavers

579 search results - page 104 / 116
» Constraint Validation in Model Compilers
Sort
View
MMMACNS
2001
Springer
14 years 8 days ago
Typed MSR: Syntax and Examples
Abstract. Many design flaws and incorrect analyses of cryptographic protoAppeared in the Proceedings of the First International Workshop on Mathematical Methods, Models and Archit...
Iliano Cervesato
NOSSDAV
2001
Springer
14 years 8 days ago
Dimensioning server access bandwidth and multicast routing in overlay networks
Application-level multicast is a new mechanism for enabling multicast in the Internet. Driven by the fast growth of network audio/video streams, application-level multicast has be...
Sherlia Shi, Jonathan S. Turner, Marcel Waldvogel
HICSS
1998
IEEE
158views Biometrics» more  HICSS 1998»
14 years 3 days ago
Accountability Centered Approach to Business Process Reengineering
In this paper, Accountability Centered Approach (ACA) is proposed for business process engineering. The ACA approach enables the designers and users to focus on the requirements a...
Mitchell M. Tseng, Chuan-Jun Su, Ma Qinhai
GECCO
2007
Springer
189views Optimization» more  GECCO 2007»
13 years 11 months ago
A genetic algorithm with exon shuffling crossover for hard bin packing problems
A novel evolutionary approach for the bin packing problem (BPP) is presented. A simple steady-state genetic algorithm is developed that produces results comparable to other approa...
Philipp Rohlfshagen, John A. Bullinaria
EUC
2006
Springer
13 years 11 months ago
On Multiprocessor Utility Accrual Real-Time Scheduling with Statistical Timing Assurances
We present the first Utility Accrual (or UA) real-time scheduling algorithm for multiprocessors, called gMUA. The algorithm considers an application model where real-time activiti...
Hyeonjoong Cho, Haisang Wu, Binoy Ravindran, E. Do...