Sciweavers

2106 search results - page 128 / 422
» Specifying C concepts
Sort
View
ACSW
2006
13 years 11 months ago
Formal analysis of secure contracting protocol for e-tendering
Formal specification and verification of protocols have been credited for uncovering protocol flaws; revealing inadequacies in protocol design of the Initial Stage and Negotiation...
Rong Du, Ernest Foo, Colin Boyd, Kim-Kwang Raymond...
PDPTA
2004
13 years 11 months ago
Achieving Flow Level QoS in Cut-Through Networks Through Admission Control and DiffServ
Cluster networks will serve as the future access networks for multimedia streaming, massive multiplayer online gaming, e-commerce, network storage etc. And for those application ar...
Frank Olaf Sem-Jacobsen, Sven-Arne Reinemo, Tor Sk...
WSC
2004
13 years 11 months ago
Data and Metadata Requirements for Composable Mission Space Environments
Composability is the capability to select and assemble reusable simulation components in various combinations into simulation systems to meet user requirements. The Defense Modeli...
Katherine L. Morse
DM
2008
94views more  DM 2008»
13 years 10 months ago
On low degree k-ordered graphs
A simple graph G is k-ordered (respectively, k-ordered hamiltonian) if, for any sequence of k distinct vertices v1, . . . , vk of G, there exists a cycle (respectively, a hamilton...
Karola Mészáros
ENTCS
2006
168views more  ENTCS 2006»
13 years 10 months ago
Case Study: Model Transformations for Time-triggered Languages
In this study, we introduce a model transformation tool for a time-triggered language: Giotto. The tool uses graphs to represent the source code (Giotto) and the target (the sched...
Tivadar Szemethy