Sciweavers

1520 search results - page 113 / 304
» The Ring Loading Problem
Sort
View
CIS
2007
Springer
15 years 4 months ago
Controlled Secret Leakage
— Privacy is the claim of individuals, groups and institutions to determine for themselves, when, how and to what extent information about them is communicated to others. How to ...
Tianjie Cao, Shi Huang, Hui Cui, Yipeng Wu, Qihan ...
97
Voted
SIGCOMM
2005
ACM
15 years 3 months ago
Meridian: a lightweight network location service without virtual coordinates
This paper introduces a lightweight, scalable and accurate framework, called Meridian, for performing node selection based on network location. The framework consists of an overla...
Bernard Wong, Aleksandrs Slivkins, Emin Gün S...
89
Voted
FORMATS
2005
Springer
15 years 3 months ago
Time Supervision of Concurrent Systems Using Symbolic Unfoldings of Time Petri Nets
Monitoring real-time concurrent systems is a challenging task. In this paper we formulate (model-based) supervision by means of hidden state history reconstruction, from event (e.g...
Thomas Chatain, Claude Jard
105
Voted
WAOA
2005
Springer
86views Algorithms» more  WAOA 2005»
15 years 3 months ago
SONET ADMs Minimization with Divisible Paths
We consider an optical routing problem. SONET add-drop multiplexers (ADMs) are the dominant cost factor in SONET /WDM rings. The number of SONET ADMs required by a set of traffic...
Leah Epstein, Asaf Levin
CONCUR
2004
Springer
15 years 3 months ago
The Pros and Cons of Netcharts
Netcharts have been introduced recently by Mukund et al. in [17]. This new appealing approach to the specification of collections of message sequence charts (MSCs) benefits from ...
Nicolas Baudru, Rémi Morin