Sciweavers

1210 search results - page 123 / 242
» Specifying Precise Use Cases with Use Case Charts
Sort
View
HPCC
2009
Springer
15 years 8 months ago
Grid Network Dimensioning by Modeling the Deadline Constrained Bulk Data Transfers
—Grid applications need to move large amounts of data between distributed resources within deterministic time frames. In most cases it is possible to specify the volume and the d...
Kashif Munir, Pascale Vicat-Blanc Primet, Michael ...
INFOCOM
1999
IEEE
15 years 8 months ago
Hop Reservation Multiple Access (HRMA) for Ad-Hoc Networks
A new multichannel MAC protocol called Hop-Reservation Multiple Access (HRMA) for wireless ad-hoc networks (multi-hop packet radio networks) is introduced, specified and analyzed. ...
Zhenyu Tang, J. J. Garcia-Luna-Aceves
ASIACRYPT
2006
Springer
15 years 7 months ago
On the Security of OAEP
Currently, the best and only evidence of the security of the OAEP encryption scheme is a proof in the contentious random oracle model. Here we give further arguments in support of...
Alexandra Boldyreva, Marc Fischlin
AUTOMATICA
2006
152views more  AUTOMATICA 2006»
15 years 4 months ago
Simulation-based optimization of process control policies for inventory management in supply chains
A simulation-based optimization framework involving simultaneous perturbation stochastic approximation (SPSA) is presented as a means for optimally specifying parameters of intern...
Jay D. Schwartz, Wenlin Wang, Daniel E. Rivera
FGCS
2006
101views more  FGCS 2006»
15 years 4 months ago
Evaluating architectures for independently auditing service level agreements
Web and grid services are quickly maturing as a technology that allows for the integration of applications belonging to different administrative domains, enabling much faster and ...
Ana Carolina Barbosa, Jacques Philippe Sauvé...