Sciweavers

1724 search results - page 273 / 345
» Models for Concurrency
Sort
View
ACNS
2010
Springer
200views Cryptology» more  ACNS 2010»
14 years 1 months ago
Deniable Internet Key Exchange
In this work, we develop a family of protocols for deniable Internet Key-Exchange (IKE) with the following properties: • Highly practical efficiency, and conceptual simplicity a...
Andrew Chi-Chih Yao, Yunlei Zhao
CLUSTER
2009
IEEE
14 years 1 months ago
A scalable and generic task scheduling system for communication libraries
Abstract—Since the advent of multi-core processors, the physionomy of typical clusters has dramatically evolved. This new massively multi-core era is a major change in architectu...
François Trahay, Alexandre Denis
SIGSOFT
2009
ACM
14 years 1 months ago
Qos-driven runtime adaptation of service oriented architectures
Runtime adaptation is recognized as a viable way for a serviceoriented system to meet QoS requirements in its volatile operating environment. In this paper we propose a methodolog...
Valeria Cardellini, Emiliano Casalicchio, Vincenzo...
FM
2001
Springer
130views Formal Methods» more  FM 2001»
14 years 1 months ago
Towards a Topos Theoretic Foundation for the Irish School of Constructive Mathematics
The Irish School of Constructive Mathematics (M♣ c ), which extends the VDM, exploits an algebraic notation based upon monoids and their morphisms for the purposes of abstract mo...
Mícheál Mac an Airchinnigh
NSF
2001
Springer
197views Computer Vision» more  NSF 2001»
14 years 1 months ago
A Collaborative Infrastructure for Mobile and Wireless Systems
Today‘s use of mobile phones is mostly for coordination purposes. It seems reasonable to assume that 3G and 4G high bandwidth systems will be used in a similar way. This paper th...
Lutz Michael Wegner, Morad Ahmad, Stefan Fröh...