Sciweavers

1620 search results - page 79 / 324
» eg 2010
Sort
View
SEUS
2010
IEEE
15 years 2 months ago
Ubiquitous Verification of Ubiquitous Systems
Abstract. Ubiquitous embedded computing systems expected to reliably perform one or more relevant tasks need design and verification methods currently not available. New envisioned...
Reinhard Wilhelm, Matteo Maffei
SOCO
2010
Springer
15 years 2 months ago
Managing Variability in Workflow with Feature Model Composition Operators
Abstract. In grid-based scientific applications, building a workflow essentially involves composing parameterized services describing families of services and then configuring the ...
Mathieu Acher, Philippe Collet, Philippe Lahire, R...
SRDS
2010
IEEE
15 years 2 months ago
Lightweight Fault-Tolerance for Peer-to-Peer Middleware
We address the problem of providing transparent, lightweight, fault-tolerance mechanisms for generic peer-to-peer middleware systems. The main idea is to use the peer-to-peer overl...
Rolando Martins, Priya Narasimhan, Luis Lopes, Fer...
WINE
2010
Springer
124views Economy» more  WINE 2010»
15 years 2 months ago
A Novel Approach to Propagating Distrust
Trust propagation is a fundamental topic of study in the theory and practice of ranking and recommendation systems on networks. The Page Rank [9] algorithm ranks web pages by propa...
Christian Borgs, Jennifer T. Chayes, Adam Tauman K...
ANCS
2010
ACM
15 years 1 months ago
A traffic-aware top-N firewall ruleset approximation algorithm
Packet classification is widely used in various network security and operation applications. Two of the main challenges are the increasing number of classification rules, amount o...
Ho-Yu Lam, Donghan (Jarod) Wang, H. Jonathan Chao