Sciweavers

2234 search results - page 131 / 447
» Protocol Implementation Using Integrated Layer Processing
Sort
View
ICCAD
2000
IEEE
124views Hardware» more  ICCAD 2000»
15 years 9 months ago
A Methodology for Verifying Memory Access Protocols in Behavioral Synthesis
— Memory is one of the most important components to be optimized in the several phases of the synthesis process. ioral synthesis, a memory is viewed as an abstract construct whic...
Gernot Koch, Taewhan Kim, Reiner Genevriere
FSEN
2009
Springer
15 years 8 months ago
Specification and Validation of Behavioural Protocols in the rCOS Modeler
The rCOS modeler implements the requirements modelling phase of a model driven component-based software engineering process. Components are specified in rCOS, a relational calculus...
Zhenbang Chen, Charles Morisset, Volker Stolz
P2P
2006
IEEE
119views Communications» more  P2P 2006»
15 years 10 months ago
Defense against Intrusion in a Live Streaming Multicast System
Application-level multicast systems are vulnerable to attacks that impede nodes from receiving desired data. Live streaming protocols are especially susceptible to packet loss ind...
Maya Haridasan, Robbert van Renesse
DSN
2008
IEEE
15 years 11 months ago
Toward an understanding of the processing delay of peer-to-peer relay nodes
Abstract—Peer-to-peer relaying is commonly used in realtime applications to cope with NAT and firewall restrictions and provide better quality network paths. As relaying is not ...
Kuan-Ta Chen, Jing-Kai Lou
BPM
2008
Springer
115views Business» more  BPM 2008»
15 years 6 months ago
Workflows in Dynamic Development Processes
Process management systems are used in many domains to monitor and control processes. Development processes require specific support, which is not provided by conventional workflow...
Thomas Heer, Christoph Briem, René Wör...