Sciweavers

721 search results - page 25 / 145
» Exploiting Meta-Level information in a Distributed Schedulin...
Sort
View
CCS
2004
ACM
14 years 4 months ago
Formally verifying information flow type systems for concurrent and thread systems
Information flow type systems provide an elegant means to enforce confidentiality of programs. Using the proof assistant Isabelle/HOL, we have machine-checked a recent work of B...
Gilles Barthe, Leonor Prensa Nieto
MDM
2009
Springer
269views Communications» more  MDM 2009»
14 years 5 months ago
R-U-In? - Exploiting Rich Presence and Converged Communications for Next-Generation Activity-Oriented Social Networking
—With the growing popularity of social networking, traditional Internet Service Providers (ISPs) and Telecom operators have both started exploring new opportunities to boost thei...
Nilanjan Banerjee, Dipanjan Chakraborty, Koustuv D...
ICCAD
1998
IEEE
109views Hardware» more  ICCAD 1998»
14 years 3 months ago
CORDS: hardware-software co-synthesis of reconfigurable real-time distributed embedded systems
Field programmable gate arrays (FPGAs) are commonly used in embedded systems. Although it is possible to reconfigure some FPGAs while an embedded system is operational, this featu...
Robert P. Dick, Niraj K. Jha
ICC
2007
IEEE
14 years 5 months ago
Satisfying Elastic Short Term Fairness in High Throughput Wireless Communication Systems with Multimedia Services
Abstract—In this paper we study the problem of providing shortterm access time fairness in wireless communication systems with multimedia services, while still maintaining high s...
Timotheos Kastrinogiannis, Symeon Papavassiliou
CCR
2007
119views more  CCR 2007»
13 years 11 months ago
Exploiting KAD: possible uses and misuses
Peer-to-peer systems have seen a tremendous growth in the last few years and peer-to-peer traffic makes a major fraction of the total traffic seen in the Internet. The dominating ...
Moritz Steiner, Taoufik En-Najjary, Ernst W. Biers...