We propose an admission control policy for wireless multimedia networks that is based on the well known threshold-based guard channel method. The new scheme deals with two differen...
Mahmoud T. El-Hadidi, Khaled M. F. Elsayed, Mohame...
The world-wide-web does not support referential integrity, i.e. dangling references do exist. This can be very annoying; in particular, if a user pays for some service in the form...
We describe logic synthesis techniques for designing diverse implementations of combinational logic circuits in order to maximize the data integrity of diverse duplex systems in t...
In recent years simulation proved to be a useful technology to support the making of recurring decisions. This paper describes the integrated simulator concept and requirements to...
K. Guus C. de Ruiter, Joost M. Sluijs, Wilbert B. ...
Abstract. We consider the problem of specifying and computing consistent answers to queries against databases that do not satisfy given integrity constraints. This is done by simul...
Marcelo Arenas, Leopoldo E. Bertossi, Michael Kife...