Sciweavers

533 search results - page 78 / 107
» Control flow based obfuscation
Sort
View
118
Voted
EURONGI
2006
Springer
15 years 6 months ago
Performance Analysis of Wireless Multihop Data Networks
We consider wireless multihop data networks with random multi-access mechanisms at the MAC layer. In general, our aim is to study the performance as perceived by users in a dynamic...
Nidhi Hegde, Alexandre Proutiére
123
Voted
CCGRID
2008
IEEE
15 years 4 months ago
Orchestrating Data-Centric Workflows
When orchestrating data-centric workflows as are commonly found in the sciences, centralised servers can become a bottleneck to the performance of a workflow; output from service i...
Adam Barker, Jon B. Weissman, Jano I. van Hemert
132
Voted
DEXA
2008
Springer
176views Database» more  DEXA 2008»
15 years 4 months ago
Inventing Less, Reusing More, and Adding Intelligence to Business Process Modeling
Recently, a variety of workflow patterns has been proposed focusing on specific aspects like control flow, data flow, and resource assignments. Though these patterns are relevant f...
Lucinéia Heloisa Thom, Manfred Reichert, Ca...
ENTCS
2008
123views more  ENTCS 2008»
15 years 2 months ago
A Chart Semantics for the Pi-Calculus
We present a graphical semantics for the pi-calculus, that is easier to visualize and better suited to expressing causality and temporal properties than conventional relational se...
Johannes Borgström, Andrew D. Gordon, Andrew ...
TON
2002
170views more  TON 2002»
15 years 2 months ago
The BLUE active queue management algorithms
In order to stem the increasing packet loss rates caused by an exponential increase in network traffic, the IETF has been considering the deployment of active queue management tech...
Wu-chang Feng, Kang G. Shin, Dilip D. Kandlur, Deb...