Sciweavers

2137 search results - page 93 / 428
» Proving Abstract Non-interference
Sort
View
71
Voted
ICC
2009
IEEE
124views Communications» more  ICC 2009»
14 years 8 months ago
Routing Games for Traffic Engineering
Abstract--Current data network scenario makes Traffic Engineering (TE) a very challenging task. The ever growing access rates and new applications running on end-hosts result in mo...
Federico Larroca, Jean-Louis Rougier
102
Voted
ICDE
2009
IEEE
168views Database» more  ICDE 2009»
14 years 8 months ago
An Economic Model for Self-Tuned Cloud Caching
Abstract--Cloud computing, the new trend for service infrastructures requires user multi-tenancy as well as minimal capital expenditure. In a cloud that services large amounts of d...
Debabrata Dash, Verena Kantere, Anastasia Ailamaki
93
Voted
ICNP
2009
IEEE
14 years 8 months ago
RASPberry: A Stable Reader Activation Scheduling Protocol in Multi-Reader RFID Systems
Abstract--Recent technological advances have motivated largescale deployment of RFID systems. RFID readers are often static and carefully deployed in a planned manner. However, the...
ShaoJie Tang, Jing Yuan, Xiang-Yang Li, Guihai Che...
88
Voted
IFM
2009
Springer
155views Formal Methods» more  IFM 2009»
14 years 8 months ago
Application of Graph Transformation in Verification of Dynamic Systems
Abstract. A communication system evolves dynamically with the addition and deletion of services. In our previous work [12], a graph transformation system (GTS) was used to model th...
Zarrin Langari, Richard J. Trefler
CORR
2010
Springer
128views Education» more  CORR 2010»
14 years 7 months ago
Trajectory Codes for Flash Memory
Abstract--Flash memory is well-known for its inherent asymmetry: the flash-cell charge levels are easy to increase but are hard to decrease. In a general rewriting model, the store...
Anxiao Jiang, Michael Langberg, Moshe Schwartz, Je...