Sciweavers

1080 search results - page 116 / 216
» Performance analysis of the CONFIDANT protocol
Sort
View
JGS
2010
106views more  JGS 2010»
14 years 4 months ago
On vector autoregressive modeling in space and time
Despite the fact that it provides a potentially useful analytical tool, allowing for the joint modeling of dynamic interdependencies within a group of connected areas, until latel...
Valter Di Giacinto
JIPS
2010
159views more  JIPS 2010»
14 years 4 months ago
A Dynamic Approach to Estimate Change Impact using Type of Change Propagation
Software evolution is an ongoing process carried out with the aim of extending base applications either for adding new functionalities or for adapting software to changing environm...
Chetna Gupta, Yogesh Singh, Durg Singh Chauhan
FSTTCS
2003
Springer
15 years 3 months ago
Tagging Makes Secrecy Decidable with Unbounded Nonces as Well
Tagging schemes have been used in security protocols to ensure that the analysis of such protocols can work with messages of bounded length. When the set of nonces is bounded, this...
Ramaswamy Ramanujam, S. P. Suresh
DAC
2004
ACM
15 years 1 months ago
A methodology to improve timing yield in the presence of process variations
The ability to control the variations in IC fabrication process is rapidly diminishing as feature sizes continue towards the sub-100 nm regime. As a result, there is an increasing...
Sreeja Raj, Sarma B. K. Vrudhula, Janet Meiling Wa...
IPPS
2006
IEEE
15 years 3 months ago
An adaptive dynamic grid-based approach to data distribution management
a This paper presents a novel Adaptive Dynamic Gridbased Data Distribution Management (DDM) scheme, which we refer to as ADGB. The main objective of our protocol is to optimize DDM...
Azzedine Boukerche, YunFeng Gu, Regina Borges de A...