Sciweavers

3521 search results - page 175 / 705
» Algorithmic Control in Concurrent Computations
Sort
View
129
Voted
SACMAT
2004
ACM
15 years 8 months ago
A role-based approach to access control for XML databases
In order to provide a general access control methodology for parts of XML documents, we propose combining rolebased access control as found in the Role Graph Model, with a methodo...
Jingzhu Wang, Sylvia L. Osborn
140
Voted
JDCTA
2010
272views more  JDCTA 2010»
14 years 9 months ago
Optimal Control of Nonlinear Systems Using the Homotopy Perturbation Method: Infinite Horizon Case
This paper presents a new method for solving a class of infinite horizon nonlinear optimal control problems. In this method, first the original optimal control problem is transfor...
Amin Jajarmi, Hamidreza Ramezanpour, Arman Sargolz...
LCN
2002
IEEE
15 years 7 months ago
Multicast Performance Analysis for High-Speed Torus Networks
Overall efficiency of high-performance computing clusters not only relies on the computing power of the individual nodes, but also on the performance that the underlying network c...
Sarp Oral, Alan D. George
113
Voted
CONCUR
2000
Springer
15 years 7 months ago
Weak Bisimulation for Probabilistic Systems
Abstract. In this paper, we introduce weak bisimulation in the framework of Labeled Concurrent Markov Chains, that is, probabilistic transition systems which exhibit both probabili...
Anna Philippou, Insup Lee, Oleg Sokolsky
98
Voted
SAGA
2007
Springer
15 years 8 months ago
Randomized Algorithms and Probabilistic Analysis in Wireless Networking
Abstract. Devices connected wirelessly, in various forms including computers, hand-held devices, ad hoc networks, and embedded systems, are expected to become ubiquitous all around...
Aravind Srinivasan