Sciweavers

7329 search results - page 1388 / 1466
» Network Extractor Protocols
Sort
View
113
Voted
SIGOPSE
2000
ACM
15 years 7 months ago
The data management problem in post-pc devices and a solution
The demand for network-enabled limited-footprint mobile devices is increasing rapidly. A central challenge that must be addressed in order to use these next-generation devices eff...
Ramakrishna Gummadi, Randy H. Katz
128
Voted
AC
1999
Springer
15 years 7 months ago
Enhancing Replica Management Services to Cope with Group Failures
In a distributed system, replication of components, such as objects, is a well known way of achieving availability. For increased availability, crashed and disconnected components...
Paul D. Ezhilchelvan, Santosh K. Shrivastava
CONCUR
1999
Springer
15 years 7 months ago
From Synchrony to Asynchrony
Abstract. We present an in-depth discussion of the relationships between synchrony and asynchrony. Simple models of both paradigms are presented, and we state theorems which guaran...
Albert Benveniste, Benoît Caillaud, Paul Le ...
128
Voted
DATE
1998
IEEE
103views Hardware» more  DATE 1998»
15 years 7 months ago
Efficient Encoding Schemes for Symbolic Analysis of Petri Nets
Petri nets are a graph-based formalism appropriate to model concurrentsystems such as asynchronouscircuits or network protocols. Symbolic techniques based on Binary Decision Diagr...
Enric Pastor, Jordi Cortadella
114
Voted
ICCAD
1998
IEEE
153views Hardware» more  ICCAD 1998»
15 years 7 months ago
Intellectual property protection by watermarking combinational logic synthesis solutions
The intellectual property (IP) business model is vulnerable to a number of potentially devastating obstructions, such as misappropriation and intellectual property fraud. We propo...
Darko Kirovski, Yean-Yow Hwang, Miodrag Potkonjak,...
« Prev « First page 1388 / 1466 Last » Next »