Sciweavers

1656 search results - page 262 / 332
» Building Dependable Distributed Applications Using AQUA
Sort
View
ATAL
2011
Springer
13 years 12 months ago
Commitments with regulations: reasoning about safety and control in REGULA
Commitments provide a flexible means for specifying the business relationships among autonomous and heterogeneous agents, and lead to a natural way of enacting such relationships...
Elisa Marengo, Matteo Baldoni, Cristina Baroglio, ...
MOBICOM
2004
ACM
15 years 5 months ago
Broadcast reception rates and effects of priority access in 802.11-based vehicular ad-hoc networks
One key usage of VANET is to support vehicle safety applications. This use case is characterized by the prominence of broadcasts in scaled settings. In this context, we try to ans...
Marc Torrent-Moreno, Daniel Jiang, Hannes Hartenst...
IEEEPACT
2006
IEEE
15 years 5 months ago
Two-level mapping based cache index selection for packet forwarding engines
Packet forwarding is a memory-intensive application requiring multiple accesses through a trie structure. The efficiency of a cache for this application critically depends on the ...
Kaushik Rajan, Ramaswamy Govindarajan
ESA
2006
Springer
140views Algorithms» more  ESA 2006»
15 years 3 months ago
Latency Constrained Aggregation in Sensor Networks
A sensor network consists of sensing devices which may exchange data through wireless communication. A particular feature of sensor networks is that they are highly energy constrai...
Luca Becchetti, Peter Korteweg, Alberto Marchetti-...
DEBS
2008
ACM
15 years 28 days ago
Availability models for underlay aware overlay networks
Availability of an overlay network is a necessary condition for event delivery in event based systems. The availability of the overlay links depends on the underlying physical net...
Madhu Kumar SD, Umesh Bellur