Sciweavers

571 search results - page 66 / 115
» Performing causality analysis by bounded model checking
Sort
View
EMSOFT
2001
Springer
15 years 4 months ago
An Implementation of Scoped Memory for Real-Time Java
Abstract. This paper presents our experience implementing the memory management extensions in the Real-Time Specification for Java. These extensions are designed to given real-tim...
William S. Beebee, Martin C. Rinard
NETWORKING
2004
15 years 1 months ago
Experimental Analysis of the SABUL Congestion Control Algorithm
Several new protocols such as RBUDP, User-Level UDP, Tsunami, and SABUL, have been proposed as alternatives to TCP for high speed data transfer. The purpose of this paper is to an...
Phoemphun Oothongsap, Yannis A. Viniotis, Mladen A...
TIT
2010
146views Education» more  TIT 2010»
14 years 6 months ago
Information propagation speed in mobile and delay tolerant networks
Abstract--The goal of this paper is to increase our understanding of the fundamental performance limits of mobile and Delay Tolerant Networks (DTNs), where end-to-end multi-hop pat...
Philippe Jacquet, Bernard Mans, Georgios Rodolakis
ICDE
2008
IEEE
139views Database» more  ICDE 2008»
16 years 1 months ago
Simultaneous Equation Systems for Query Processing on Continuous-Time Data Streams
We introduce Pulse, a framework for processing continuous queries over models of continuous-time data, which can compactly and accurately represent many real-world activities and p...
Jennie Rogers, Olga Papaemmanouil, Ugur Çet...
C3S2E
2009
ACM
15 years 3 months ago
A verification framework for access control in dynamic web applications
This paper proposes a security analysis framework for dynamic web applications. A reverse engineering process is performed over a dynamic web application to extract a rolebased ac...
Manar H. Alalfi, James R. Cordy, Thomas R. Dean