Sciweavers

793 search results - page 136 / 159
» Protocol Modeling with Model Program Composition
Sort
View
EDBTW
2010
Springer
14 years 4 months ago
Toward a software development methodology for anonymity applications
There are some software applications especially in privacy protection domain which they need anonymity support. Therefore lots of methods and protocols have been presented so far ...
Marzieh Ispareh, Behrouz Tork Ladani, Shirin Shari...
HPCA
2003
IEEE
14 years 9 months ago
Evaluating the Impact of Communication Architecture on the Performability of Cluster-Based Services
We consider the impact of different communication architectures on the performability (performance + availability) of cluster-based servers. In particular, we use a combination of ...
Kiran Nagaraja, Neeraj Krishnan, Ricardo Bianchini...
PADS
2000
ACM
14 years 1 months ago
Applying parallel discrete event simulation to network emulation
The simulation of wide area computer networks is one area where the benefits of parallel simulation have been clearly demonstrated. Here we present a description of a system that...
Rob Simmonds, Russell Bradford, Brian Unger
AAMAS
2000
Springer
13 years 9 months ago
Rational Coordination in Multi-Agent Environments
We adopt the decision-theoretic principle of expected utility maximization as a paradigm for designing autonomous rational agents, and present a framework that uses this paradigm t...
Piotr J. Gmytrasiewicz, Edmund H. Durfee
CONCUR
1999
Springer
14 years 1 months ago
From Synchrony to Asynchrony
Abstract. We present an in-depth discussion of the relationships between synchrony and asynchrony. Simple models of both paradigms are presented, and we state theorems which guaran...
Albert Benveniste, Benoît Caillaud, Paul Le ...