Sciweavers

637 search results - page 103 / 128
» The Case for Abstracting Security Policies
Sort
View
WWIC
2009
Springer
119views Communications» more  WWIC 2009»
15 years 8 months ago
Handover Incentives for WLANs with Overlapping Coverage
Abstract. It is well known that in IEEE 802.11 networks, the assignment of low-rate and high-rate users to the same access point significantly degrades the performance of the high...
Xenofon Fafoutis, Vasilios A. Siris
104
Voted
FOSSACS
2010
Springer
15 years 8 months ago
Reachability Analysis of Communicating Pushdown Systems
Abstract. The reachability analysis of recursive programs that communicate asynchronously over reliable Fifo channels calls for restrictions to ensure decidability. We extend here ...
Alexander Heußner, Jérôme Lerou...
106
Voted
HICSS
2007
IEEE
144views Biometrics» more  HICSS 2007»
15 years 8 months ago
The Indicator Browser: A Web-Based Interface for Visualizing UrbanSim Simulation Results
Abstract— UrbanSim is a large scale land use and transportation simulator that models the possible long-term effects of different policies on urban regions. The output is present...
Yael Schwartzman, Alan Borning
IPPS
2006
IEEE
15 years 7 months ago
A hierarchical scheduling model for component-based real-time systems
In this paper, we propose a methodology for developing component-based real-time systems based on the concept of hierarchical scheduling. Recently, much work has been devoted to t...
José L. Lorente, Giuseppe Lipari, Enrico Bi...
INFOCOM
2003
IEEE
15 years 7 months ago
Goodput Analysis of a Fluid Queue with Selective Discarding and a Responsive Bursty Source
Abstract— In this paper we analyse a feedback system consisting of a finite buffer fluid queue and a responsive source. The source alternates between silence periods and active...
Parijat Dube, Eitan Altman