Sciweavers

1061 search results - page 169 / 213
» Integrity Constraints for Linked Data
Sort
View
CNSR
2005
IEEE
14 years 3 months ago
Shortest-Hop Based Reliable Network Multicast
Although many multicast communication protocols have been recommended at IETF, reliable multicast communications currently rely on programs built at the application layer, e.g., m...
Ka Lun Eddie Law, Daniel Siu
DATE
2005
IEEE
104views Hardware» more  DATE 2005»
14 years 3 months ago
Queue Management in Network Processors
: - One of the main bottlenecks when designing a network processing system is very often its memory subsystem. This is mainly due to the state-of-the-art network links operating at...
Ioannis Papaefstathiou, Theofanis Orphanoudakis, G...
ECBS
2005
IEEE
160views Hardware» more  ECBS 2005»
14 years 3 months ago
Traceability-Driven Model Refinement for Test Case Generation
Testing complex Computer-Based Systems is not only a demanding but a very critical task. Therefore the use of models for generating test data is an important goal. Tool support du...
Matthias Riebisch, Michael Hübner
NDSS
2005
IEEE
14 years 3 months ago
Privacy-Preserving Friends Troubleshooting Network
— Content sharing is a popular use of peer-to-peer systems because of their inherent scalability and low cost of maintenance. In this paper, we leverage this nature of peer-topee...
Qiang Huang, Helen J. Wang, Nikita Borisov
ZUM
2005
Springer
136views Formal Methods» more  ZUM 2005»
14 years 3 months ago
Some Guidelines for Formal Development of Web-Based Applications in B-Method
Abstract. Web-based applications are the most common form of distributed systems that have gained a lot of attention in the past ten years. Today many of us are relying on scores o...
Abdolbaghi Rezazadeh, Michael J. Butler