Sciweavers

2624 search results - page 370 / 525
» The 2LIP model and its implementations
Sort
View
PADS
2006
ACM
14 years 4 months ago
SOAr-DSGrid: Service-Oriented Architecture for Distributed Simulation on the Grid
Simulation is a low cost alternative to experimentation on real-world physical systems. Grid technology enables coordinated use of and secure access to distributed computing resou...
Xinjun Chen, Wentong Cai, Stephen John Turner, Yon...
ICSM
2005
IEEE
14 years 4 months ago
Annotated Inclusion Constraints for Precise Flow Analysis
Program flow analysis has many applications in software tools for program understanding, restructuring, verification, testing and reverse engineering. There are two important re...
Ana Milanova, Barbara G. Ryder
IMA
2005
Springer
85views Cryptology» more  IMA 2005»
14 years 3 months ago
The Physically Observable Security of Signature Schemes
In recent years much research has been devoted to producing formal models of security for cryptographic primitives and to designing schemes that can be proved secure in such models...
Alexander W. Dent, John Malone-Lee
DSRT
2003
IEEE
14 years 3 months ago
Performance Evaluation of the Managed Bandwidth Service with QoS Guarantees
This paper describes a solution to extend the Managed Bandwidth Service (MBS), which is provided on a backbone network using MPLS VPNs, to non-MPLS domains and also evaluates it. ...
Christos Bouras, Vaggelis Kapoulas, Dimitris Primp...
INFOCOM
2003
IEEE
14 years 3 months ago
A Utility-Based Congestion Control Scheme for Internet-Style Networks with Delay
— In this paper, we develop, analyze and implement a congestion control scheme obtained in a noncooperative game framework where each user’s cost function is composed of a pric...
Tansu Alpcan, Tamer Basar