Sciweavers

1641 search results - page 145 / 329
» Termination Analysis with Algorithmic Learning
Sort
View
126
Voted
ISORC
2005
IEEE
15 years 9 months ago
Proof Slicing with Application to Model Checking Web Services
Web Services emerge as a new paradigm for distributed computing. Model checking is an important verification method to ensure the trustworthiness of composite WS. abstraction and...
Hai Huang, Wei-Tek Tsai, Raymond A. Paul
127
Voted
ICCS
2005
Springer
15 years 9 months ago
Adaptive Surface Modeling Using a Quadtree of Quadratic Finite Elements
Abstract. This article presents special quadrilateral quadratic refinement elements, which provide geometry and field continuity across Tjunctions where two elements are connecte...
G. P. Nikishkov
116
Voted
APLAS
2004
ACM
15 years 9 months ago
Protocol Specialization
Abstract. In component-based programming, the programmer assembles applications from prefabricated components. The assembly process has two main steps: adapting a component by twea...
Matthias Neubauer, Peter Thiemann
112
Voted
INFOCOM
2003
IEEE
15 years 8 months ago
A Novel Mechanism for Contention Resolution in HFC Networks
Abstract— The Medium Access Control (MAC) scheme proposed by DAVIC/DVB, IEEE 802.14 and DOCSIS for the upstream channel of Hybrid Fiber Coaxial (HFC) access networks is based on ...
Mark Van den Broek, Ivo J. B. F. Adan, Saishankar ...
136
Voted
MSWIM
2003
ACM
15 years 8 months ago
Simulation of large ad hoc networks
An ad hoc network is formed by wireless mobile nodes (hosts) that operate as terminals as well as routers in the network, without any centralized administration. Research in ad ho...
Valeriy Naoumov, Thomas R. Gross