Sciweavers

708 search results - page 104 / 142
» Computational Law
Sort
View
QOSIP
2005
Springer
15 years 5 months ago
Utility Proportional Fair Bandwidth Allocation: An Optimization Oriented Approach
In this paper, we present a novel approach to the congestion control and resource allocation problem of elastic and real-time traffic in telecommunication networks. With the concep...
Tobias Harks
RTA
2005
Springer
15 years 5 months ago
Intruder Deduction for AC-Like Equational Theories with Homomorphisms
Cryptographic protocols are small programs which involve a high level of concurrency and which are difficult to analyze by hand. The most successful methods to verify such protocol...
Pascal Lafourcade, Denis Lugiez, Ralf Treinen
IMR
2004
Springer
15 years 5 months ago
A Generalized Graph-Theoretic Mesh Optimization Model
This paper presents a generic approach to mesh global optimization via node movement, based on a discrete graph-theoretic model. Mesh is considered as an electric system with lump...
Andrey A. Mezentsev
ACSAC
2003
IEEE
15 years 5 months ago
MLS-PCA: A High Assurance Security Architecture for Future Avionics
1 DOD Joint Vision 2020 (JV2020) is the integrated multi-service planning document for conduct among coalition forces of future warfare. It requires the confluence of a number of k...
Clark Weissman
CONCUR
2001
Springer
15 years 4 months ago
CCS with Priority Guards
It has long been recognised that standard process algebra has difficulty dealing with actions of different priority, such as for instance an interrupt action of high priority. Va...
Iain Phillips