Sciweavers

147 search results - page 15 / 30
» Editing Configurations of P Systems
Sort
View
ASIAN
2006
Springer
153views Algorithms» more  ASIAN 2006»
15 years 3 months ago
Automata-Based Confidentiality Monitoring
Abstract Non-interference is typically used as a baseline security policy to formalize confidentiality of secret information manipulated by a program. In contrast to static checkin...
Gurvan Le Guernic, Anindya Banerjee, Thomas P. Jen...
EDBTW
2006
Springer
15 years 3 months ago
Conflict Resolution in Updates Through XML Views
Abstract. In this paper, we focus on B2B scenarios where XML views are extracted from relational databases and sent over the Web to another application that edits them and sends th...
André Prisco Vargas, Vanessa P. Braganholo,...
DATE
2010
IEEE
204views Hardware» more  DATE 2010»
15 years 4 months ago
Assertion-based verification of RTOS properties
— Today, mobile and embedded real time systems have to cope with the migration and allocation of multiple software tasks running on top of a real time operating system (RTOS) res...
Marcio F. S. Oliveira, Henning Zabel, Wolfgang M&u...
INFOCOM
2002
IEEE
15 years 4 months ago
Provisioning Content Distribution Networks for Streaming Media
This paper develops simple cost models for provisioning content distribution networks that use the simple and highly scalable bandwidth skimming protocol for streaming. New insight...
Jussara M. Almeida, Derek L. Eager, Michael C. Fer...
CORR
2010
Springer
79views Education» more  CORR 2010»
14 years 12 months ago
Random Topologies and the emergence of cooperation: the role of short-cuts
We present a detailed study about the role of the short-cuts of a network in promoting the emergence of cooperation in a population of agents playing the Prisoner's Dilemma Ga...
Daniele Vilone, Angel Sánchez, Jesús...