Sciweavers

328 search results - page 48 / 66
» Proving Termination of Communicating Programs
Sort
View
IFIP
2009
Springer
14 years 2 months ago
A Calculus of Trustworthy Ad Hoc Networks
We propose a process calculus for mobile ad hoc networks which embodies a behaviour-based multilevel decentralised trust model. Our trust model supports both direct trust, by monit...
Massimo Merro, Eleonora Sibilio
IFIP
2004
Springer
14 years 1 months ago
Decidability of Opacity with Non-Atomic Keys
The most studied property, secrecy, is not always sufficient to prove the security of a protocol. Other properties such as anonymity, privacy or opacity could be useful. Here, we u...
Laurent Mazaré
ICPP
2008
IEEE
14 years 2 months ago
Scalable Dynamic Load Balancing Using UPC
An asynchronous work-stealing implementation of dynamic load balance is implemented using Unified Parallel C (UPC) and evaluated using the Unbalanced Tree Search (UTS) benchmark ...
Stephen Olivier, Jan Prins
IFL
2003
Springer
144views Formal Methods» more  IFL 2003»
14 years 26 days ago
Building an Interface Between Eden and Maple: A Way of Parallelizing Computer Algebra Algorithms
Eden is a parallel functional language extending Haskell with processes. This paper describes the implementation of an interface between the Eden language and the Maple system. The...
Rafael Martínez, Ricardo Pena
ICC
2007
IEEE
218views Communications» more  ICC 2007»
14 years 2 months ago
Utility-Based Resource Allocation for Layer-Encoded IPTV Multicast in IEEE 802.16 (WiMAX) Wireless Networks
In this paper, we propose a utility-based resource allocation scheme for layer-encoded IPTV multicast streaming service over IEEE 802.16 WiMAX networks. Unlike existing utility-bas...
Wen-Hsing Kuo, Tehuang Liu, Wanjiun Liao