Sciweavers

4897 search results - page 159 / 980
» Trust Modeling for Peer-to-Peer Based Computing Systems
Sort
View
DAC
1999
ACM
15 years 8 months ago
Application of High Level Interface-Based Design to Telecommunications System Hardware
The assumption in moving system modelling to higher levels is that this improves the design process by allowing exploration of the architecture, providing an unambiguous specifica...
Dyson Wilkes, M. M. Kamal Hashmi
CCGRID
2008
IEEE
15 years 11 months ago
Admission Control in a Computational Market
We propose, implement and evaluate three admission models for computational Grids. The models take the expected demand into account and offer a specific performance guarantee. Th...
Thomas Sandholm, Kevin Lai, Scott H. Clearwater
CDC
2009
IEEE
115views Control Systems» more  CDC 2009»
15 years 2 months ago
A multiplay model for rate-independent and rate-dependent hysteresis with nonlocal memory
Abstract-- We consider the multiplay model for hysteresis with nonlocal memory. This model consists of N mass/spring/dashpot with deadzone elements. The hysteresis map of the multi...
Bojana Drincic, Dennis S. Bernstein
WPES
2003
ACM
15 years 9 months ago
Hidden Credentials
Hidden Credentials are useful in situations where requests for service, credentials, access policies and resources are extremely sensitive. We show how transactions which depend o...
Jason E. Holt, Robert W. Bradshaw, Kent E. Seamons...
RTSS
2007
IEEE
15 years 10 months ago
Toward the Predictable Integration of Real-Time COTS Based Systems
The integration phase of real-time COTS-based systems is often problematic because when multiple tasks run concurrently, the interference at the bus level between cache fetching a...
Rodolfo Pellizzoni, Marco Caccamo