Sciweavers

43264 search results - page 8196 / 8653
» Comparing models of computation
Sort
View
134
Voted
IWPC
2003
IEEE
15 years 9 months ago
YAAB (Yet Another AST Browser): Using OCL to Navigate ASTs
In the last decades several tools and environments defined and introduced languages for querying, navigating sforming abstract syntax trees. These environments were meant to supp...
Giuliano Antoniol, Massimiliano Di Penta, Ettore M...
LCN
2003
IEEE
15 years 9 months ago
Multi-Class Bandwidth Allocation Policy for 3G Wireless Networks
In this paper we develop an analytical threshold-based bandwidth allocation policy for 3G multi-class cellular networks. We consider the effects of user mobility when the cellular...
Nidal Nasser, Hossam S. Hassanein
LICS
2003
IEEE
15 years 9 months ago
Intruder Deductions, Constraint Solving and Insecurity Decision in Presence of Exclusive or
We present decidability results for the verification of cryptographic protocols in the presence of equational theories corresponding to xor and Abelian groups. Since the perfect ...
Hubert Comon-Lundh, Vitaly Shmatikov
LICS
2003
IEEE
15 years 9 months ago
Labelled Markov Processes: Stronger and Faster Approximations
This paper reports on and discusses three notions of approximation for Labelled Markov Processes that have been developed last year. The three schemes are improvements over former...
Vincent Danos, Josee Desharnais
P2P
2003
IEEE
146views Communications» more  P2P 2003»
15 years 9 months ago
The Deployment of Cache Servers in P2P Networks for Improved Performance in Content-Delivery
The peer-to-peer (P2P) model generally requires that bidirectional and direct communications for contentdelivery be set up between user peers after discovery of the desired conten...
Tetsuya Oh-ishi, Koji Sakai, Tetsuya Iwata, Akira ...
« Prev « First page 8196 / 8653 Last » Next »