Sciweavers

1134 search results - page 127 / 227
» Distributed Proving in Access-Control Systems
Sort
View
96
Voted
CDC
2008
IEEE
137views Control Systems» more  CDC 2008»
15 years 10 months ago
On the stability of the Foschini-Miljanic algorithm with time-delays
— Many of the distributed power control algorithms for wireless networks in the literature ignore the fact that while the algorithms necessitate communication among users, propag...
Themistoklis Charalambous, Ioannis Lestas, Glenn V...
146
Voted
PDP
2008
IEEE
15 years 10 months ago
Type Safe Algorithmic Skeletons
This paper addresses the issue of type safe algorithmic skeletons. From a theoretical perspective we contribute by: formally specifying a type system for algorithmic skeletons, an...
Denis Caromel, Ludovic Henrio, Mario Leyton
148
Voted
OPODIS
2007
15 years 5 months ago
Small-World Networks: From Theoretical Bounds to Practical Systems
Abstract. In small-world networks, each peer is connected to its closest neighbors in the network topology, as well as to additional long-range contact(s), also called shortcut(s)....
François Bonnet, Anne-Marie Kermarrec, Mich...
117
Voted
IPPS
1999
IEEE
15 years 7 months ago
Examples of Program Composition Illustrating the Use of Universal Properties
Abstract. This paper uses a theory of composition based on existential and universal properties. Universal properties are useful to describe components interactions through shared ...
Michel Charpentier, K. Mani Chandy
125
Voted
PODC
2005
ACM
15 years 9 months ago
Building scalable and robust peer-to-peer overlay networks for broadcasting using network coding
We propose a scheme for building peer-to-peer overlay networks for broadcasting using network coding. The scheme addresses many practical issues such as scalability, robustness, c...
Kamal Jain, László Lovász, Ph...