Sciweavers

473 search results - page 73 / 95
» The Case for Quantum Key Distribution
Sort
View
JSW
2008
167views more  JSW 2008»
13 years 7 months ago
An Approach to Discover Dependencies between Service Operations
Service composition is emerging as an important paradigm for constructing distributed applications by combining and reusing independently developed component services. One key issu...
Shuying Yan, Jing Wang 0002, Chen Liu, Lei Liu
ENTCS
2007
84views more  ENTCS 2007»
13 years 7 months ago
A Rewriting Logic Framework for Soft Constraints
Soft constraints extend classical constraints to deal with non-functional requirements, overconstrained problems and preferences. Bistarelli, Montanari and Rossi have developed a ...
Martin Wirsing, Grit Denker, Carolyn L. Talcott, A...
SIAMSC
2008
116views more  SIAMSC 2008»
13 years 7 months ago
A New Asymptotic Preserving Scheme Based on Micro-Macro Formulation for Linear Kinetic Equations in the Diffusion Limit
We propose a new numerical scheme for linear transport equations. It is based on a decomposition of the distribution function into equilibrium and non-equilibrium parts. We also us...
Mohammed Lemou, Luc Mieussens
JCM
2007
177views more  JCM 2007»
13 years 7 months ago
Collision Free MAC Protocols for Wireless Ad Hoc Networks based on BIBD Architecture
—Wireless Ad hoc networks represent a powerful telecommunication infrastructure that is being exploited for enabling general wireless networking connectivity for a variety of sig...
Pietro Camarda, Orazio Fiume
TON
2008
239views more  TON 2008»
13 years 7 months ago
Characterization of failures in an operational IP backbone network
Abstract--As the Internet evolves into a ubiquitous communication infrastructure and supports increasingly important services, its dependability in the presence of various failures...
Athina Markopoulou, Gianluca Iannaccone, Supratik ...