Sciweavers

2137 search results - page 93 / 428
» Proving Abstract Non-interference
Sort
View
109
Voted
ICC
2009
IEEE
124views Communications» more  ICC 2009»
15 years 15 days ago
Routing Games for Traffic Engineering
Abstract--Current data network scenario makes Traffic Engineering (TE) a very challenging task. The ever growing access rates and new applications running on end-hosts result in mo...
Federico Larroca, Jean-Louis Rougier
131
Voted
ICDE
2009
IEEE
168views Database» more  ICDE 2009»
15 years 15 days ago
An Economic Model for Self-Tuned Cloud Caching
Abstract--Cloud computing, the new trend for service infrastructures requires user multi-tenancy as well as minimal capital expenditure. In a cloud that services large amounts of d...
Debabrata Dash, Verena Kantere, Anastasia Ailamaki
141
Voted
ICNP
2009
IEEE
15 years 14 days ago
RASPberry: A Stable Reader Activation Scheduling Protocol in Multi-Reader RFID Systems
Abstract--Recent technological advances have motivated largescale deployment of RFID systems. RFID readers are often static and carefully deployed in a planned manner. However, the...
ShaoJie Tang, Jing Yuan, Xiang-Yang Li, Guihai Che...
140
Voted
IFM
2009
Springer
155views Formal Methods» more  IFM 2009»
15 years 14 days ago
Application of Graph Transformation in Verification of Dynamic Systems
Abstract. A communication system evolves dynamically with the addition and deletion of services. In our previous work [12], a graph transformation system (GTS) was used to model th...
Zarrin Langari, Richard J. Trefler
114
Voted
CORR
2010
Springer
128views Education» more  CORR 2010»
15 years 4 days ago
Trajectory Codes for Flash Memory
Abstract--Flash memory is well-known for its inherent asymmetry: the flash-cell charge levels are easy to increase but are hard to decrease. In a general rewriting model, the store...
Anxiao Jiang, Michael Langberg, Moshe Schwartz, Je...