Sciweavers

2468 search results - page 303 / 494
» On Model Checking Techniques for Randomized Distributed Syst...
Sort
View
PE
2006
Springer
107views Optimization» more  PE 2006»
15 years 4 months ago
Efficient steady-state analysis of second-order fluid stochastic Petri nets
This paper presents an efficient solution technique for the steady-state analysis of the second-order Stochastic Fluid Model underlying a second-order Fluid Stochastic Petri Net (...
Marco Gribaudo, Rossano Gaeta
132
Voted
ISTA
2003
15 years 5 months ago
Managing Business Logic with Symbolic Computation
: A new approach of building enterprise distributed applications for layer of business rules as standard part of architecture is proposed in this paper. The approach uses symbolic ...
Ruslan Shevchenko, Anatoly E. Doroshenko
ICPP
2007
IEEE
15 years 10 months ago
CPU MISER: A Performance-Directed, Run-Time System for Power-Aware Clusters
Performance and power are critical design constraints in today’s high-end computing systems. Reducing power consumption without impacting system performance is a challenge for t...
Rong Ge, Xizhou Feng, Wu-chun Feng, Kirk W. Camero...
CORR
2010
Springer
135views Education» more  CORR 2010»
15 years 2 months ago
Modified EESM Based Link Adaptation Algorithm for Multimedia Transmission in Multicarrier Systems
The previous link adaptation algorithms on ofdm based systems use equal modulation order for all sub carrier index within a block. For multimedia transmission using ofdm as the mo...
R. Sandanalakshmi, Athilakshmi, K. Manivannan
AFRICACRYPT
2010
Springer
15 years 7 months ago
Efficient Unidirectional Proxy Re-Encryption
Abstract. Proxy re-encryption (PRE) allows a semi-trusted proxy to convert a ciphertext originally intended for Alice into one encrypting the same plaintext for Bob. The proxy only...
Sherman S. M. Chow, Jian Weng, Yanjiang Yang, Robe...