Sciweavers

1179 search results - page 195 / 236
» Relative Timing Based Verification of Timed Circuits and Sys...
Sort
View
INFOCOM
2005
IEEE
15 years 10 months ago
Capturing accurate snapshots of the Gnutella network
— A common approach for measurement-based characterization of peer-to-peer (P2P) systems is to capture overlay snapshots using a crawler. The accuracy of captured snapshots by P2...
Daniel Stutzbach, Reza Rejaie
CEFP
2005
Springer
15 years 10 months ago
Exploiting Purely Functional Programming to Obtain Bounded Resource Behaviour: The Hume Approach
This chapter describes Hume: a functionally-based language for programming with bounded resource usage, including time and space properties. The purpose of the Hume language design...
Kevin Hammond
RE
2005
Springer
15 years 10 months ago
Contextual Risk Analysis for Interview Design
Interviews with stakeholders can be a useful method for identifying user needs and establishing requirements. However, interviews are also problematic. They are time consuming and...
Tira Cohene, Steve M. Easterbrook
GIS
2009
ACM
15 years 9 months ago
A multidimensional model representing continuous fields in spatial data warehouses
Data warehouses and On-Line Analytical Processing (OLAP) provide an analysis framework supporting the decision making process. In many application domains, complex analysis tasks ...
Alejandro A. Vaisman, Esteban Zimányi
COMPSAC
2000
IEEE
15 years 8 months ago
Firewall Security: Policies, Testing and Performance Evaluation
This paper explores the firewall security and performance relationship for distributed systems. Experiments are conducted to set firewall security into seven different levels and ...
Michael R. Lyu, Lorrien K. Y. Lau