Sciweavers

2089 search results - page 83 / 418
» Finding Environment Guarantees
Sort
View
121
Voted
ISCC
2005
IEEE
15 years 9 months ago
Improving Survivability through Traffic Engineering in MPLS Networks
The volume of higher priority Internet applications is increasing as the Internet continues to evolve. Customers require Quality of Service (QoS) guarantees with not only guarante...
Mina Amin, Kin-Hon Ho, George Pavlou, Michael P. H...
126
Voted
TCAD
2008
97views more  TCAD 2008»
15 years 3 months ago
Encoding Large Asynchronous Controllers With ILP Techniques
State encoding is one of the most difficult problems in the synthesis of asynchronous controllers. This paper presents a method that can solve the problem of large controllers spec...
Josep Carmona, Jordi Cortadella
84
Voted
TWC
2008
93views more  TWC 2008»
15 years 3 months ago
A Distributed Subset Selection Algorithm for a Set of Mobile Links with Power Control
The capacity of a power controlled wireless network can be changing due to user's mobility, fading or shadowing effects. As a result, the quality of service (QOS) of all users...
Chun-Chia Chen, Duan-Shin Lee
137
Voted
ATC
2007
Springer
15 years 10 months ago
An Approach to a Trustworthy System Architecture Using Virtualization
We present a system architecture for trusted transactions in highly sensitive environments. This architecture takes advantage of techniques provided by the Trusted Computing Group ...
Frederic Stumpf, Michael Benz, Martin Hermanowski,...
116
Voted
FSTTCS
2007
Springer
15 years 10 months ago
Safely Composing Security Protocols
Security protocols are small programs that are executed in hostile environments. Many results and tools have been developed to formally analyze the security of a protocol. However ...
Véronique Cortier, Jérémie De...