Sciweavers

707 search results - page 115 / 142
» Performance Modeling and Analysis of the Universal Control H...
Sort
View
AINA
2007
IEEE
15 years 6 months ago
Heuristics for Improving Cryptographic Key Assignment in a Hierarchy
In hierarchical distributed systems, shared data access can be controlled by assigning user groups single cryptographic keys that allow high level users derive low level keys, but...
Anne V. D. M. Kayem, Patrick Martin, Selim G. Akl
VALUETOOLS
2006
ACM
149views Hardware» more  VALUETOOLS 2006»
15 years 5 months ago
Tail asymptotics for discrete event systems
In the context of communication networks, the framework of stochastic event graphs allows a modeling of control mechanisms induced by the communication protocol and an analysis of ...
Marc Lelarge
IDEAL
2004
Springer
15 years 5 months ago
Exploiting Safety Constraints in Fuzzy Self-organising Maps for Safety Critical Applications
This paper defines a constrained Artificial Neural Network (ANN) that can be employed for highly-dependable roles in safety critical applications. The derived model is based upon t...
Zeshan Kurd, Tim P. Kelly, Jim Austin
EMSOFT
2001
Springer
15 years 4 months ago
An Implementation of Scoped Memory for Real-Time Java
Abstract. This paper presents our experience implementing the memory management extensions in the Real-Time Specification for Java. These extensions are designed to given real-tim...
William S. Beebee, Martin C. Rinard
ADVIS
2000
Springer
15 years 4 months ago
Throughput Stability of Reliable Multicast Protocols
Traditional reliable multicast protocols depend on assumptions about flow control and reliability mechanisms, and they suffer from a kind of interference between these mechanisms. ...
Öznur Özkasap, Kenneth P. Birman