Sciweavers

2500 search results - page 406 / 500
» Specifying Behavior in C
Sort
View
157
Voted
SIGMETRICS
2011
ACM
270views Hardware» more  SIGMETRICS 2011»
14 years 6 months ago
Scalable monitoring via threshold compression in a large operational 3G network
Threshold-based performance monitoring in large 3G networks is very challenging for two main factors: large network scale and dynamics in both time and spatial domains. There exis...
Suk-Bok Lee, Dan Pei, MohammadTaghi Hajiaghayi, Io...
ECWEB
2011
Springer
277views ECommerce» more  ECWEB 2011»
14 years 3 months ago
Trust-Based Selection of Partners
The community of multi-agent systems has been studying ways to improve the selection of partner agents for joint action. One of such approaches consists in estimating the trustwort...
Joana Urbano, Ana Paula Rocha, Eugénio C. O...
138
Voted
CAV
2012
Springer
236views Hardware» more  CAV 2012»
13 years 5 months ago
Lock Removal for Concurrent Trace Programs
Abstract. We propose a trace-based concurrent program analysis to soundly remove redundant synchronizations such as locks while preserving the behaviors of the concurrent computati...
Vineet Kahlon, Chao Wang
169
Voted
SIGMETRICS
2012
ACM
271views Hardware» more  SIGMETRICS 2012»
13 years 5 months ago
An empirical comparison of Java remote communication primitives for intra-node data transmission
This paper presents a benchmarking suite that measures the performance of using sockets and eXtensible Markup Language remote procedure calls (XML-RPC) to exchange intra-node mess...
Philip F. Burdette, William F. Jones, Brian C. Blo...
123
Voted
PKC
2012
Springer
219views Cryptology» more  PKC 2012»
13 years 5 months ago
On the Security of Dynamic Group Signatures: Preventing Signature Hijacking
We identify a potential weakness in the standard security model for dynamic group signatures which appears to have been overlooked previously. More specifically, we highlight tha...
Yusuke Sakai, Jacob C. N. Schuldt, Keita Emura, Go...