Sciweavers

34202 search results - page 6772 / 6841
» The Tera computer system
Sort
View
ESORICS
2008
Springer
13 years 10 months ago
Symmetric Key Approaches to Securing BGP - A Little Bit Trust Is Enough
The Border Gateway Protocol (BGP) is the de facto inter-domain routing protocol that connects autonomous systems (ASes). Despite its importance for the Internet infrastructure, BGP...
Bezawada Bruhadeshwar, Sandeep S. Kulkarni, Alex X...
FM
2008
Springer
152views Formal Methods» more  FM 2008»
13 years 10 months ago
Constraint Prioritization for Efficient Analysis of Declarative Models
The declarative modeling language Alloy and its automatic analyzer provide an effective tool-set for building designs of systems and checking their properties. The Alloy Analyzer p...
Engin Uzuncaova, Sarfraz Khurshid
IMC
2007
ACM
13 years 10 months ago
Network loss inference with second order statistics of end-to-end flows
We address the problem of calculating link loss rates from end-to-end measurements. Contrary to existing works that use only the average end-to-end loss rates or strict temporal c...
Hung Xuan Nguyen, Patrick Thiran
IMC
2007
ACM
13 years 10 months ago
Quality-of-service class specific traffic matrices in ip/mpls networks
In this paper we consider the problem of determining traffic matrices for end-to-end demands in an IP/MPLS network that supports multiple quality of service (QoS) classes. More pr...
Stefan Schnitter, Franz Hartleb, Martin Horneffer
AGI
2008
13 years 10 months ago
Language Processing in Human Brain
Human brain is exceptionally complex and simple at the same time. Its extremely composite biological structure results itself in human everyday behavior that many people might cons...
Alexander Borzenko
« Prev « First page 6772 / 6841 Last » Next »