Sciweavers

3820 search results - page 486 / 764
» Bounded Model Debugging
Sort
View
STACS
2009
Springer
15 years 10 months ago
Nonclairvoyant Speed Scaling for Flow and Energy
We study online nonclairvoyant speed scaling to minimize total flow time plus energy. We first consider the traditional model where the power function is P(s) = sα . We give a ...
Ho-Leung Chan, Jeff Edmonds, Tak Wah Lam, Lap-Kei ...
141
Voted
ICC
2009
IEEE
157views Communications» more  ICC 2009»
15 years 10 months ago
Optimal Relay Assignment and Power Allocation in Selection Based Cooperative Cellular Networks
—We consider a system with a single base station communicating with multiple users over orthogonal channels while being assisted by multiple relays. Several recent works have sug...
Sachin Kadloor, Raviraj Adve
SP
2009
IEEE
114views Security Privacy» more  SP 2009»
15 years 10 months ago
Formally Certifying the Security of Digital Signature Schemes
We present two machine-checked proofs of the existential unforgeability under adaptive chosen-message attacks of the Full Domain Hash signature scheme. These proofs formalize the ...
Santiago Zanella Béguelin, Gilles Barthe, B...
129
Voted
INFOCOM
2009
IEEE
15 years 10 months ago
Absence of Evidence as Evidence of Absence: A Simple Mechanism for Scalable P2P Search
Abstract—We propose a novel search mechanism for unstructured p2p networks, and show that it is both scalable, i.e., it leads to a bounded query traffic load per peer as the pee...
Stratis Ioannidis, Peter Marbach
135
Voted
AAIM
2009
Springer
101views Algorithms» more  AAIM 2009»
15 years 10 months ago
Integer Polyhedra for Program Analysis
Polyhedra are widely used in model checking and abstract interpretation. Polyhedral analysis is effective when the relationships between variables are linear, but suffers from im...
Philip J. Charles, Jacob M. Howe, Andy King