Sciweavers

15372 search results - page 2773 / 3075
» The Semantics of Semantic Annotation
Sort
View
155
Voted
CCR
2006
92views more  CCR 2006»
15 years 4 months ago
Flow labelled IP over ATM: design and rationale
We describe a system in which layer 2 switching is placed directly under the control of layer 3 routing protocols on a hop-by-hop basis. Specifically, ATM switching is controlled ...
Greg Minshall, Robert M. Hinden, Eric Hoffman, Fon...
CL
2006
Springer
15 years 4 months ago
Runtime bytecode transformation for Smalltalk
Transforming programs to alter their semantics is of wide interest, for purposes as diverse as off-the-shelf component adaptation, optimization,tracegeneration,andexperimentationw...
Marcus Denker, Stéphane Ducasse, Éri...
CLEIEJ
2006
88views more  CLEIEJ 2006»
15 years 4 months ago
A Stochastic Concurrent Constraint Based Framework to Model and Verify Biological Systems
Concurrent process calculi are powerful formalisms for modelling concurrent systems. The mathematical style underlying process calculi allow to both model and verify properties of...
Carlos Olarte, Camilo Rueda
CN
2006
99views more  CN 2006»
15 years 4 months ago
P2P reputation management: Probabilistic estimation vs. social networks
Managing trust is a key issue for a wide acceptance of P2P computing, particularly in critical areas such as e-commerce. Reputation-based trust management has been identified in t...
Zoran Despotovic, Karl Aberer
153
Voted
CN
2006
117views more  CN 2006»
15 years 4 months ago
Using equivalence-checking to verify robustness to denial of service
In this paper, we introduce a new security property which intends to capture the ability of a cryptographic protocol being resistant to denial of service. This property, called im...
Stéphane Lafrance
« Prev « First page 2773 / 3075 Last » Next »