Sciweavers

986 search results - page 149 / 198
» Simulation Modeling of Weak-Consistency Protocols
Sort
View
ACMICEC
2007
ACM
112views ECommerce» more  ACMICEC 2007»
13 years 11 months ago
An empirical study of interest-based negotiation
While argumentation-based negotiation has been accepted as a promising alternative to game-theoretic or heuristic based negotiation, no evidence has been provided to confirm this ...
Philippe Pasquier, Ramon Hollands, Frank Dignum, I...
CORR
2007
Springer
120views Education» more  CORR 2007»
13 years 7 months ago
Remote laboratories: new technology and standard based architecture
E-Laboratories are important components of elearning environments, especially in scientific and technical disciplines. First widespread E-Labs consisted in proposing simulations o...
Hcene Benmohamed, Arnaud Lelevé, Patrick Pr...
JSA
2006
81views more  JSA 2006»
13 years 7 months ago
Deferred locking with shadow transaction for client-server DBMSs
Data-shipping systems that allow inter-transaction caching raise the need of a transactional cache consistency maintenance (CCM) protocol because each client is able to cache a po...
Hyeokmin Kwon, Songchun Moon
TSP
2008
107views more  TSP 2008»
13 years 7 months ago
Opportunistic Spectrum Access via Periodic Channel Sensing
The problem of opportunistic access of parallel channels occupied by primary users is considered. Under a continuous-time Markov chain modeling of the channel occupancy by the prim...
Qing Zhao, Stefan Geirhofer, Lang Tong, Brian M. S...
ISCA
2012
IEEE
232views Hardware» more  ISCA 2012»
11 years 10 months ago
RADISH: Always-on sound and complete race detection in software and hardware
Data-race freedom is a valuable safety property for multithreaded programs that helps with catching bugs, simplifying memory consistency model semantics, and verifying and enforci...
Joseph Devietti, Benjamin P. Wood, Karin Strauss, ...