Sciweavers

2947 search results - page 570 / 590
» The timely token protocol
Sort
View
LISA
2007
13 years 9 months ago
Stork: Package Management for Distributed VM Environments
In virtual machine environments each application is often run in its own virtual machine (VM), isolating it from other applications running on the same physical machine. Contentio...
Justin Cappos, Scott M. Baker, Jeremy Plichta, Duy...
COCO
2010
Springer
149views Algorithms» more  COCO 2010»
13 years 8 months ago
Trade-Off Lower Bounds for Stack Machines
—A space bounded Stack Machine is a regular Turing Machine with a read-only input tape, several space bounded read-write work tapes, and an unbounded stack. Stack Machines with a...
Matei David, Periklis A. Papakonstantinou
BPM
2008
Springer
161views Business» more  BPM 2008»
13 years 8 months ago
BESERIAL: Behavioural Service Interface Analyser
In a service-oriented architecture, software services interact by means of message exchanges that follow certain patterns documented in the form of behavioural interfaces. As any s...
Ali Aït-Bachir, Marlon Dumas, Marie-Christine...
CANS
2008
Springer
118views Cryptology» more  CANS 2008»
13 years 8 months ago
Workload Characterization of a Lightweight SSL Implementation Resistant to Side-Channel Attacks
Abstract. Ever-growing mobility and ubiquitous wireless Internet access raise the need for secure communication with devices that may be severely constrained in terms of processing...
Manuel Koschuch, Johann Großschädl, Udo...
AIME
2005
Springer
13 years 8 months ago
EORCA: A Collaborative Activities Representation for Building Guidelines from Field Observations
In the objective of building care team guidelines from field observations, this paper introduces a representation method for describing the medical collaborative activities during ...
Liliane Pellegrin, Nathalie Bonnardel, Franç...