Sciweavers

4987 search results - page 307 / 998
» Fuzzifying P Systems
Sort
View
ATVA
2008
Springer
90views Hardware» more  ATVA 2008»
15 years 6 months ago
Tree Pattern Rewriting Systems
Classical verification often uses abstraction when dealing with data. On the other hand, dynamic XML-based applications have become pervasive, for instance with the ever growing im...
Blaise Genest, Anca Muscholl, Olivier Serre, Marc ...
DEBS
2010
ACM
15 years 4 months ago
Providing basic security mechanisms in broker-less publish/subscribe systems
The provisioning of basic security mechanisms such as authentication and confidentiality is highly challenging in a content-based publish/subscribe system. Authentication of publi...
Muhammad Adnan Tariq, Boris Koldehofe, Ala' Altawe...
MTA
2002
83views more  MTA 2002»
15 years 4 months ago
A Model for Availability of Quality of Service in Distributed Multimedia Systems
In this paper we introduce a new model for the definition and the implementation of quality of service (QoS) in distributed multimedia systems. The model provides both the users an...
Athanasios G. Malamos, Elias N. Malamas, Theodora ...
RP
2010
Springer
146views Control Systems» more  RP 2010»
15 years 3 months ago
Depth Boundedness in Multiset Rewriting Systems with Name Binding
Abstract. In this paper we consider ν-MSR, a formalism that combines the two main existing approaches for multiset rewriting, namely MSR and CMRS. In ν-MSR we rewrite multisets o...
Fernando Rosa Velardo
NBIS
2009
Springer
15 years 11 months ago
A Survey of Security Middleware for Pervasive and Ubiquitous Systems
- Recently, pervasive and ubiquitous computing evolved tremendously and has become an integral part of many fields. This is widely attributed to their efficiency in integrating wit...
Jameela Al-Jaroodi, Alyaziyah Al-Dhaheri, Fatmah A...