Sciweavers

1723 search results - page 220 / 345
» Generalized file system dependencies
Sort
View
84
Voted
WOSP
2010
ACM
15 years 5 months ago
Analytical modeling of lock-based concurrency control with arbitrary transaction data access patterns
Nowadays the 2-Phase-Locking (2PL) concurrency control algorithm still plays a core rule in the construction of transactional systems (e.g. database systems and transactional memo...
Pierangelo di Sanzo, Roberto Palmieri, Bruno Cicia...
ICAS
2009
IEEE
197views Robotics» more  ICAS 2009»
15 years 5 months ago
Web QoE Evaluation in Multi-agent Networks: Validation of ITU-T G.1030
— User’s requirements have become a key factor for any Quality of Service (QoS) management model to succeed. The advent and rise of new broadband services and network architect...
Eva Ibarrola, Fidel Liberal, Ianire Taboada, Rodri...
96
Voted
SPIN
2009
Springer
15 years 4 months ago
Identifying Modeling Errors in Signatures by Model Checking
: Most intrusion detection systems deployed today apply misuse detection as analysis method. Misuse detection searches for attack traces in the recorded audit data using predefined...
Sebastian Schmerl, Michael Vogel, Hartmut Kön...
91
Voted
FOAL
2009
ACM
15 years 4 months ago
Enhancing base-code protection in aspect-oriented programs
Aspect-oriented programming (AOP) promises to localize concerns that inherently crosscut the primary structural decomposition of a software system. Localization of concerns is cri...
Mohamed ElBendary, John Boyland
73
Voted
CDC
2008
IEEE
140views Control Systems» more  CDC 2008»
15 years 4 months ago
Information state for Markov decision processes with network delays
We consider a networked control system, where each subsystem evolves as a Markov decision process (MDP). Each subsystem is coupled to its neighbors via communication links over wh...
Sachin Adlakha, Sanjay Lall, Andrea J. Goldsmith