Sciweavers

21430 search results - page 3957 / 4286
» Abstract Effective Models
Sort
View
TON
2008
239views more  TON 2008»
15 years 4 months ago
Characterization of failures in an operational IP backbone network
Abstract--As the Internet evolves into a ubiquitous communication infrastructure and supports increasingly important services, its dependability in the presence of various failures...
Athina Markopoulou, Gianluca Iannaccone, Supratik ...
TON
2008
106views more  TON 2008»
15 years 4 months ago
On static and dynamic partitioning behavior of large-scale P2P networks
Abstract--In this paper, we analyze the problem of network disconnection in the context of large-scale P2P networks and understand how both static and dynamic patterns of node fail...
Derek Leonard, Zhongmei Yao, Xiaoming Wang, Dmitri...
JHSN
2007
105views more  JHSN 2007»
15 years 4 months ago
A priority-aware CSMA/CP MAC protocol for the all-optical IP-over-WDM metropolitan area ring network
Abstract. The paper proposes a priority-aware MAC (Medium Access Control) protocol for a core metropolitan area network in the next generation Internet, which is an OPS (Optical Pa...
Jih-Hsin Ho, Wen-Shyang Hwang, Ce-Kuen Shieh
TOPNOC
2008
15 years 4 months ago
McMillan's Complete Prefix for Contextual Nets
Abstract. In a seminal paper, McMillan proposed a technique for constructing a finite complete prefix of the unfolding of bounded (i.e., finitestate) Petri nets, which can be used ...
Paolo Baldan, Andrea Corradini, Barbara König...
TOSEM
2008
117views more  TOSEM 2008»
15 years 4 months ago
Power laws in software
e than previously established, appearing at various levels of abstraction, in diverse systems and languages. The implications of this phenomenon cover various aspects of software e...
Panagiotis Louridas, Diomidis Spinellis, Vasileios...
« Prev « First page 3957 / 4286 Last » Next »