Sciweavers

181 search results - page 36 / 37
» Deriving Specifications for Systems That Are Connected to th...
Sort
View
JUCS
2008
113views more  JUCS 2008»
13 years 7 months ago
What is Correctness of Security Protocols?
: As soon as major protocol flaws were discovered empirically -- a good luck that is not older than the early 1990s -- this title question came up to the world. It was soon realise...
Giampaolo Bella
NETWORK
2008
150views more  NETWORK 2008»
13 years 7 months ago
WiMAX networks: from access to service platform
Recently, WiMAX has been proposed as an attractive wireless communication technology for providing broadband access for metropolitan areas. Despite its salient features from the t...
Kejie Lu, Yi Qian, Hsiao-Hwa Chen, Shengli Fu
DA
2010
141views more  DA 2010»
13 years 7 months ago
Optimal Static Hedging of Volumetric Risk in a Competitive Wholesale Electricity Market
In competitive wholesale electricity markets, regulated load serving entities (LSEs) and marketers with default service contracts have obligations to serve fluctuating load at pre...
Yumi Oum, Shmuel S. Oren
INFOCOM
2000
IEEE
14 years 23 hour ago
Experimental QoS Performances of Multimedia Applications
Abstract – To bring QoS to the Internet, several better-thanbest-effort network services have been recently devised with significant efforts. The goal of this paper is to measure...
Phil Wang, Yechiam Yemini, Danilo Florissi, John A...
ENTCS
2006
146views more  ENTCS 2006»
13 years 7 months ago
Relating State-Based and Process-Based Concurrency through Linear Logic
This paper has the purpose of reviewing some of the established relationships between logic and concurrency, and of exploring new ones. Concurrent and distributed systems are noto...
Iliano Cervesato, Andre Scedrov