Sciweavers

229 search results - page 30 / 46
» Issues in Analyzing the Behavior of Event Dispatching System...
Sort
View
ICCD
1995
IEEE
109views Hardware» more  ICCD 1995»
13 years 11 months ago
Verifying the performance of the PCI local bus using symbolic techniques
Symbolic model checking is a successful technique for checking properties of large finite-state systems. This method has been used to verify a number of real-world hardware desig...
Sérgio Vale Aguiar Campos, Edmund M. Clarke...
CCS
2006
ACM
13 years 11 months ago
Providing witness anonymity in peer-to-peer systems
In this paper, we introduce the concept of witness anonymity for peer-to-peer systems. Witness anonymity combines the seemingly conflicting requirements of anonymity (for honest p...
Bo Zhu, Sanjeev Setia, Sushil Jajodia
MISQ
2000
104views more  MISQ 2000»
13 years 7 months ago
Understanding Computer-Mediated Discussions: Positivist and Interpretive Analyses of Group Support System Use
This research considers whether interpretive techniques can be used to enhance our understanding of computer-mediated discussions. The case study considered in this research is th...
Eileen M. Trauth, Leonard M. Jessup
DEBS
2007
ACM
13 years 11 months ago
A taxonomy for denial of service attacks in content-based publish/subscribe systems
Denial of Service (DoS) attacks continue to affect the availability of critical systems on the Internet. The existing DoS problem is enough to merit significant research dedicated...
Alex Wun, Alex King Yeung Cheung, Hans-Arno Jacobs...
RTSS
2007
IEEE
14 years 1 months ago
Generalized Tardiness Bounds for Global Multiprocessor Scheduling
We consider the issue of deadline tardiness under global multiprocessor scheduling algorithms. We present a general tardiness-bound derivation that is applicable to a wide variety...
Hennadiy Leontyev, James H. Anderson