Sciweavers

735 search results - page 83 / 147
» Modeling the Propagation of User Preferences
Sort
View
DSN
2004
IEEE
14 years 2 months ago
Verifying Web Applications Using Bounded Model Checking
The authors describe the use of bounded model checking (BMC) for verifying Web application code. Vulnerable sections of code are patched automatically with runtime guards, allowin...
Yao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung...
APCCM
2009
14 years 8 days ago
Conceptual Application Domain Modelling
Application domain description precedes requirements engineering, and is the basis for the development of a software or information system that satisfies all expectations of its u...
Bernhard Thalheim, Klaus-Dieter Schewe, Hui Ma
ICDE
2011
IEEE
245views Database» more  ICDE 2011»
13 years 2 months ago
Stochastic skyline operator
— In many applications involving the multiple criteria optimal decision making, users may often want to make a personal trade-off among all optimal solutions. As a key feature, t...
Xuemin Lin, Ying Zhang, Wenjie Zhang, Muhammad Aam...
INFOCOM
2003
IEEE
14 years 4 months ago
A Utility-Based Congestion Control Scheme for Internet-Style Networks with Delay
— In this paper, we develop, analyze and implement a congestion control scheme obtained in a noncooperative game framework where each user’s cost function is composed of a pric...
Tansu Alpcan, Tamer Basar
INFOCOM
2003
IEEE
14 years 4 months ago
Pricing strategies under heterogeneous service requirements
— This paper analyzes a communication network with heterogeneous customers. We investigate priority queueing as a way to differentiate between these users. Customers join the net...
Michel Mandjes