Sciweavers

10870 search results - page 2099 / 2174
» Model Checking Programs
Sort
View
CEC
2007
IEEE
14 years 1 months ago
A multi-layered solution for supporting isp traffic demand using genetic algorithm
This paper proposes a unique feedback governed multi layered architectural model to support ISP's traffic demands with multiple Quality of Service(QoS) constraints. The propos...
Gajaruban Kandavanam, Dmitri Botvich, Sasitharan B...
BROADNETS
2004
IEEE
14 years 24 days ago
The Effects of the Sub-Carrier Grouping on Multi-Carrier Channel Aware Scheduling
Channel-aware scheduling and link adaptation (LA) methods are widely considered to be crucial for realizing high data rates in wireless networks. Multi-carrier systems that spread...
Fanchun Jin, Gokhan Sahin, Amrinder Arora, Hyeong-...
CC
2006
Springer
124views System Software» more  CC 2006»
14 years 24 days ago
Polyhedral Code Generation in the Real World
The polyhedral model is known to be a powerful framework to reason about high level loop transformations. Recent developments in optimizing compilers broke some generally accepted ...
Nicolas Vasilache, Cédric Bastoul, Albert C...
WSC
2007
13 years 11 months ago
What I wish they would have taught me (or that I would have better remembered!) in school
This panel reflects upon their experiences as simulation professionals and shares their thoughts regarding elements of their simulation education that they have found most helpful...
Charles R. Standridge, Daniel A. Finke, Carley Jur...
CCS
2008
ACM
13 years 11 months ago
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Ralf Küsters, Tomasz Truderung
« Prev « First page 2099 / 2174 Last » Next »