Sciweavers

1477 search results - page 153 / 296
» Token flow control
Sort
View
121
Voted
CHI
2005
ACM
16 years 3 months ago
What's in your wallet?: implications for global e-wallet design
As part of a comparative ethnographic study of everyday life of young professionals in London, Los Angeles, and Tokyo, we conducted a detailed survey of wallets and their contents...
Scott D. Mainwaring, Ken Anderson, Michele F. Chan...
130
Voted
RTSS
2007
IEEE
15 years 9 months ago
Utilization-Bound Based Schedulability Analysis of Weighted Round Robin Schedulers
Schedulability analysis is a cornerstone of modern real-time scheduling theory development. Utilizationbound based schedulability test is considered one of most efficient and effe...
Jianjia Wu, Jyh-Charn Liu, Wei Zhao
123
Voted
ACMSE
2006
ACM
15 years 8 months ago
Application layer intrusion detection for SQL injection
SQL injection attacks potentially affect all applications, especially web applications, that utilize a database backend. While these attacks are generally against the application...
Frank S. Rietta
130
Voted
ECRTS
1999
IEEE
15 years 7 months ago
Adding local priority-based dispatching mechanisms to P-NET networks: a fixed priority approach
In this paper we address the real-time capabilities of P-NET, which is a multi-master fieldbus standard based on a virtual token passing scheme. We show how P-NET's medium ac...
Eduardo Tovar, Francisco Vasques, Alan Burns
127
Voted
IEAAIE
1995
Springer
15 years 6 months ago
Modelling Hybrid Rule/Frame-Based Expert Systems Using Coloured Petri Nets
High level Petri Nets have recently been used for many AI applications, particularly for modelling traditional rule-based expert systems. The major effect is to facilitate the ana...
Simon C. K. Shiu, James N. K. Liu, Daniel S. Yeung