Sciweavers

4250 search results - page 188 / 850
» Understanding the Requirements on Modelling Techniques
Sort
View
SIGMETRICS
2002
ACM
107views Hardware» more  SIGMETRICS 2002»
13 years 9 months ago
Simple analytic modeling of software contention
Being able to model contention for software resources (e.g., a critical section or database lock) is paramount to building performance models that capture all aspects of the delay...
Daniel A. Menascé
SCALESPACE
2009
Springer
14 years 3 months ago
Augmented Lagrangian Method, Dual Methods and Split Bregman Iteration for ROF Model
In the recent decades the ROF model (total variation (TV) minimization) has made great successes in image restoration due to its good edge-preserving property. However, the non-diļ...
Xue-Cheng Tai, Chunlin Wu
ISW
2007
Springer
14 years 3 months ago
On the Concept of Software Obfuscation in Computer Security
Abstract. Program obfuscation is a semantic-preserving transformation aimed at bringing a program into such a form, which impedes the understanding of its algorithm and data struct...
Nikolay Kuzurin, Alexander Shokurov, Nikolay P. Va...
SIGSOFT
2009
ACM
14 years 10 months ago
Reo2MC: a tool chain for performance analysis of coordination models
In this paper, we present Reo2MC, a tool chain for the performance evaluation of coordination models. Given a coordination model represented by a stochastic Reo connector, Reo2MC ...
Farhad Arbab, Sun Meng, Young-Joo Moon, Marta Z. K...
MMAS
2004
Springer
14 years 2 months ago
Quantitative Organizational Models for Large-Scale Agent Systems
Abstract. As the scale and scope of multi-agent systems grow, it becomes increasingly important to design and manage the manner in which the participants interact. The potential fo...
Bryan Horling, Victor R. Lesser