Sciweavers

914 search results - page 91 / 183
» Branch and Bound on the Network Model
Sort
View
SPIN
2000
Springer
15 years 1 months ago
Modeling the ASCB-D Synchronization Algorithm with SPIN: A Case Study
In this paper, we describe our application of SPIN 1 to model an algorithm used to synchronize the clocks of modules that provide periodic real-time communication over a network. W...
Nicholas Weininger, Darren D. Cofer
GLOBECOM
2007
IEEE
15 years 4 months ago
Clustered K-Center: Effective Replica Placement in Peer-to-Peer Systems
Abstract— Peer-to-Peer (P2P) systems provide decentralization, self-organization, scalability and failure-resilience, but suffer from high worst-case latencies. Researchers have ...
Jian Zhou, Xin Zhang, Laxmi N. Bhuyan, Bin Liu
ACSAC
2008
IEEE
15 years 4 months ago
The Evolution of System-Call Monitoring
Computer security systems protect computers and networks from unauthorized use by external agents and insiders. The similarities between computer security and the problem of prote...
Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaj...
FLAIRS
2003
14 years 11 months ago
ADEMA : A System to Help Physicians in the Asthma Health Care
Asthma is a distressing disease, affecting up to 7% of the French population and causing considerable morbidity and mortality. A medical decision support system such can help phys...
Icham Sefion, Abdel Ennaji, Marc Gailhardou
ICDE
2005
IEEE
128views Database» more  ICDE 2005»
15 years 11 months ago
Exploiting Correlated Attributes in Acquisitional Query Processing
Sensor networks and other distributed information systems (such as the Web) must frequently access data that has a high per-attribute acquisition cost, in terms of energy, latency...
Amol Deshpande, Carlos Guestrin, Wei Hong, Samuel ...