Sciweavers

1477 search results - page 155 / 296
» Token flow control
Sort
View
110
Voted
CONEXT
2007
ACM
15 years 6 months ago
Fair and efficient scheduling in data ferrying networks
Data-ferrying disconnection-tolerant networks allow remote rural areas to access the Internet at very low cost, making them viable alternatives to more expensive access technologi...
Shimin Guo, Srinivasan Keshav
123
Voted
IEEEIAS
2008
IEEE
15 years 9 months ago
Developing a Security Typed Java Servlet
: The Lack of security policy enforcement in web development languages is one of the most important challenges in web application systems development, as there is no formal check f...
Doaa Hassan, Sherif El-Kassas, Ibrahim Ziedan
122
Voted
ASPLOS
1994
ACM
15 years 6 months ago
Software Overhead in Messaging Layers: Where Does the Time Go?
Despite improvements in network interfaces and software messaging layers, software communication overhead still dominates the hardware routing cost in most systems. In this study,...
Vijay Karamcheti, Andrew A. Chien
164
Voted
ECOWS
2008
Springer
15 years 4 months ago
Beyond Soundness: On the Semantic Consistency of Executable Process Models
Executable business process models build on the specification of process activities, their implemented business functions (e.g., Web services) and the control flow between these a...
Ingo Weber, Jörg Hoffmann, Jan Mendling
124
Voted
WSC
2004
15 years 4 months ago
Peeking Into the Black Box: Some Art and Science to Visualizing Agent-Based Models
This paper explores current metaphors for visualizing agent-based models. Metaphors include grid, network, ndimensional cubes and landscape visualization techniques. A final secti...
Stephen M. Guerin