Sciweavers

187 search results - page 26 / 38
» On the characterizations of (S, N)-implications
Sort
View
SIGCOMM
1997
ACM
14 years 1 months ago
A Flow-Based Approach to Datagram Security
Datagram services provide a simple, exible, robust, and communication abstraction; their usefulness has been well demonstrated by the success of IP, UDP, and RPC. Yet, the overwh...
Suvo Mittra, Thomas Y. C. Woo
ACM
1995
14 years 1 months ago
Characteristics of Modern System Implementation Languages
: Systems are written in systems implementation languages. What characterizes such languages in the mid-1990’s? This paper identifies the typical environment that a system is bei...
Judy M. Bishop, R. Faria

Publication
198views
14 years 25 days ago
Real time policy based management of workflows for SLA Adherence
The need for service providers to offer SLAs to gain consumers confidence has become increasingly apparent. Our work focuses on providers who manage the execution of long-running d...
Daniel Spaven, Madhavi Rani, Sumit Kumar Bose, Mik...
DAIS
2007
13 years 11 months ago
Towards Context-Aware Web Applications
In order to guarantee certain levels of QoS, a Web application needs to adapt itself to different execution contexts. However, because of the lack of coordination support in Web p...
Po-Hao Chang, Gul Agha
DISOPT
2006
155views more  DISOPT 2006»
13 years 9 months ago
Cyclical scheduling and multi-shift scheduling: Complexity and approximation algorithms
We consider the multiple shift scheduling problem modelled as a covering problem. Such problems are characterized by a constraint matrix that has in every column blocks of consecu...
Dorit S. Hochbaum, Asaf Levin