Sciweavers

1968 search results - page 199 / 394
» The Complexity of Valued Constraint Models
Sort
View
SIGACT
2010
68views more  SIGACT 2010»
14 years 8 months ago
A survey of buffer management policies for packet switches
Over the past decade, there has been great interest in the study of buffer management policies in the context of packet transmission for network switches. In a typical model, a sw...
Michael H. Goldwasser
126
Voted
SPLC
2008
15 years 3 months ago
Modeling the Variability Space of Self-Adaptive Applications
Modeling self-adaptive applications is a difficult task due to the complex relationships they have with their environments. Designers of such applications strive to model accurate...
Gilles Perrouin, Franck Chauvel, Julien DeAntoni, ...
EMSOFT
2006
Springer
15 years 3 months ago
Reusable models for timing and liveness analysis of middleware for distributed real-time and embedded systems
Distributed real-time and embedded (DRE) systems have stringent constraints on timeliness and other properties whose assurance is crucial to correct system behavior. Formal tools ...
Venkita Subramonian, Christopher D. Gill, Cé...
92
Voted
WEBDB
2010
Springer
152views Database» more  WEBDB 2010»
15 years 6 months ago
Reconciling two models of multihierarchical markup
For documents with complex or atypical annotations, multihierarchical structures play the role of the document tree in traditional XML documents. We define a model of overlapping...
Neil Moore
LICS
2007
IEEE
15 years 8 months ago
The Cost of Punctuality
In an influential paper titled “The Benefits of Relaxing Punctuality” [2], Alur, Feder, and Henzinger introduced Metric Interval Temporal Logic (MITL) as a fragment of the r...
Patricia Bouyer, Nicolas Markey, Joël Ouaknin...