Sciweavers

1225 search results - page 234 / 245
» Investigating Ontologies for Simulation Modeling
Sort
View
JPDC
2007
117views more  JPDC 2007»
13 years 8 months ago
Adversarial exploits of end-systems adaptation dynamics
Internet end-systems employ various adaptation mechanisms that enable them to respond adequately to legitimate requests in overload situations. Today, these mechanisms are incorpo...
Mina Guirguis, Azer Bestavros, Ibrahim Matta, Yuti...
CN
2004
122views more  CN 2004»
13 years 8 months ago
Group rekeying with limited unicast recovery
In secure group communications, a key server can deliver a "grouporiented" rekey message [22] to a large number of users efficiently using multicast. For reliable delive...
X. Brian Zhang, Simon S. Lam, Dong-Young Lee
JFP
2000
91views more  JFP 2000»
13 years 8 months ago
Uniform confluence in concurrent computation
Indeterminism is typical for concurrent computation. If several concurrent actors compete for the same resource then at most one of them may succeed, whereby the choice of the suc...
Joachim Niehren
MCS
2007
Springer
13 years 8 months ago
The effect of contact interface on dynamic characteristics of composite structures
In this project, nonlinear characteristics on the rolling interface of a linear guide were studied by the finite element analysis and experimental verification. Contact of the b...
James Shih-Shyn Wu, Jyh-Cheng Chang, Jui-Pin Hung
NOMS
2010
IEEE
180views Communications» more  NOMS 2010»
13 years 7 months ago
Exploiting non-dedicated resources for cloud computing
—Popular web services and applications such as Google Apps, DropBox, and Go.Pc introduce a wasteful imbalance of processing resources. Each host operated by a provider serves hun...
Artur Andrzejak, Derrick Kondo, David P. Anderson