Sciweavers

784 search results - page 39 / 157
» An underlying model for defeat mechanisms
Sort
View
CMG
2004
14 years 11 months ago
Generating Realistic TCP Workloads
The workload of a network is usually a heterogeneous aggregate of services and applications, driven by a large number of users. This complexity makes it challenging to evaluate th...
Félix Hernández-Campos, F. Donelson ...
WOA
2000
14 years 11 months ago
Calculi for Network Aware Programming
ogramming are evaluated along three different guidelines: the programming abstractions the calculus suggests; the underlying programming model; the security mechanisms provided. Th...
Gian Luigi Ferrari, Rosario Pugliese, Emilio Tuost...
ICCAD
2005
IEEE
105views Hardware» more  ICCAD 2005»
15 years 6 months ago
Weighted control scheduling
Abstract — This paper describes a practical technique for the optimal scheduling of control dominated systems minimizing the weighted average latency over all control branches. S...
Aravind Vijayakumar, Forrest Brewer
WSC
2008
15 years 5 days ago
A comparative study of genetic algorithm components in simulation-based optimisation
In this paper, we present a comparative study of different stochastic components of genetic algorithms for simulationbased optimisation of the buffer allocation problem. We explor...
Birkan Can, Andreas Beham, Cathal Heavey
GG
2008
Springer
14 years 11 months ago
Model-Driven Development of Model Transformations
The model-driven development of model transformations requires both a technique to model model transformations as well as a means to transform transformation models. Therefore, t...
Pieter Van Gorp