Sciweavers

948 search results - page 126 / 190
» Analysis of SITA policies
Sort
View
RTSS
2007
IEEE
15 years 6 months ago
Bus Access Optimization for Predictable Implementation of Real-Time Applications on Multiprocessor Systems-on-Chip
In multiprocessor systems, the traffic on the bus does not solely originate from data transfers due to data dependencies between tasks, but is also affected by memory transfers a...
Jakob Rosen, Alexandru Andrei, Petru Eles, Zebo Pe...
ATAL
2003
Springer
15 years 5 months ago
Miscomputing ratio: social cost of selfish computing
Auctions are useful mechanism for allocating items (goods, tasks, resources, etc.) in multiagent systems. The bulk of auction theory assumes that the bidders’ valuations for ite...
Kate Larson, Tuomas Sandholm
MCS
2008
Springer
14 years 12 months ago
Estimation of cost efficiency of Australian universities
The purpose of this paper is to quantify the efficiency with which Australian universities utilise their teaching resources. The study estimates the cost efficiency of 36 universi...
Jocelyn Horne, Baiding Hu
CCR
2004
151views more  CCR 2004»
14 years 11 months ago
Practical verification techniques for wide-area routing
Protocol and system designers use verification techniques to analyze a system's correctness properties. Network operators need verification techniques to ensure the "cor...
Nick Feamster
ESOP
2004
Springer
15 years 5 months ago
Trust Management in Strand Spaces: A Rely-Guarantee Method
We show how to combine trust management theories with nonce-based cryptographic protocols. The strand space framework for protocol analysis is extended by associating formulas from...
Joshua D. Guttman, F. Javier Thayer, Jay A. Carlso...