Sciweavers

677 search results - page 103 / 136
» Rigorous Object-Oriented Analysis
Sort
View
INFOCOM
2008
IEEE
14 years 2 months ago
Capacity of Asynchronous Random-Access Scheduling in Wireless Networks
Abstract—We study the throughput capacity of wireless networks which employ (asynchronous) random-access scheduling as opposed to deterministic scheduling. The central question w...
Deepti Chafekar, Dave Levin, V. S. Anil Kumar, Mad...
CSFW
2007
IEEE
14 years 2 months ago
Reasoning about Concurrency for Security Tunnels
There has been excellent progress on languages for rigorously describing key exchange protocols and techniques for proving that the network security tunnels they establish preserv...
Alwyn Goodloe, Carl A. Gunter
DSN
2007
IEEE
14 years 2 months ago
Web Services Wind Tunnel: On Performance Testing Large-Scale Stateful Web Services
New versions of existing large-scale web services such as Passport.com© have to go through rigorous performance evaluations in order to ensure a high degree of availability. Perf...
Marcelo De Barros, Jing Shiau, Chen Shang, Kenton ...
ICDM
2007
IEEE
150views Data Mining» more  ICDM 2007»
14 years 2 months ago
Connections between Mining Frequent Itemsets and Learning Generative Models
Frequent itemsets mining is a popular framework for pattern discovery. In this framework, given a database of customer transactions, the task is to unearth all patterns in the for...
Srivatsan Laxman, Prasad Naldurg, Raja Sripada, Ra...
BVAI
2007
Springer
14 years 2 months ago
Bounds of the Ability to Destroy Precise Coincidences by Spike Dithering
Correlation analysis of neuronal spiking activity relies on the availability of distributions for assessing significance. At present, these distributions can only be created by su...
Antonio Pazienti, Markus Diesmann, Sonja Grün