Sciweavers

3103 search results - page 512 / 621
» Locating Features in Distributed Systems
Sort
View
PERCOM
2005
ACM
16 years 2 months ago
Secure Routing and Intrusion Detection in Ad Hoc Networks
Numerous schemes have been proposed for secure routing protocols, and Intrusion Detection and Response Systems, for ad hoc networks. In this paper, we present a proof-of-concept i...
Anand Patwardhan, Jim Parker, Anupam Joshi, Michae...
125
Voted
WOSP
2010
ACM
15 years 9 months ago
Analytical modeling of lock-based concurrency control with arbitrary transaction data access patterns
Nowadays the 2-Phase-Locking (2PL) concurrency control algorithm still plays a core rule in the construction of transactional systems (e.g. database systems and transactional memo...
Pierangelo di Sanzo, Roberto Palmieri, Bruno Cicia...
CONCUR
2007
Springer
15 years 8 months ago
Is Observational Congruence Axiomatisable in Equational Horn Logic?
It is well known that bisimulation on µ-expressions cannot be finitely axiomatised in equational logic. Complete axiomatisations such as those of Milner and Bloom/´Esik necessar...
Michael Mendler, Gerald Lüttgen
102
Voted
CCGRID
2006
IEEE
15 years 8 months ago
Using Multiple Grid Resources for Bioinformatics Applications in GADU
During the past decade, the scientific community has witnessed the rapid accumulation of gene sequence data and data related to physiology and biochemistry of organisms. Bioinform...
Dinanath Sulakhe, Alex Rodriguez, Michael Wilde, I...
98
Voted
SYNASC
2005
IEEE
84views Algorithms» more  SYNASC 2005»
15 years 8 months ago
Membrane Computing as a Framework for Modeling Economic Processes
Abstract. This paper is a first step towards a systematic evaluation of the possibilities to use membrane computing as a modeling framework for economics. Membrane computing is a ...
Gheorghe Paun, Radu A. Paun