Sciweavers

1477 search results - page 57 / 296
» Token flow control
Sort
View
EUC
2005
Springer
15 years 6 months ago
Program Obfuscation Scheme Using Random Numbers to Complicate Control Flow
Abstract. For the security technology that has been achieved with software in the computer system and the protection of the intellectual property right of software, software protec...
Tatsuya Toyofuku, Toshihiro Tabata, Kouichi Sakura...
SIGMOD
1993
ACM
106views Database» more  SIGMOD 1993»
15 years 4 months ago
Concurrency Control and Recovery of Multidatabase Work Flows in Telecommunication Applications
In a research and technology applicationproject at Bellcore, we used multidatabase transactions to model multisystem workflows of telecommunication applications. During the projec...
W. Woody Jin, Marek Rusinkiewicz, Linda Ness, Amit...
BPM
2000
Springer
133views Business» more  BPM 2000»
15 years 4 months ago
Workflow Verification: Finding Control-Flow Errors Using Petri-Net-Based Techniques
Workflow management systems facilitate the everyday operation of business processes by taking care of the logistic control of work. In contrast to traditional information systems, ...
Wil M. P. van der Aalst
DATE
2010
IEEE
154views Hardware» more  DATE 2010»
15 years 5 months ago
A method to remove deadlocks in Networks-on-Chips with Wormhole flow control
Networks-on-Chip (NoCs) are a promising interconnect paradigm to address the communication bottleneck of Systems-on-Chip (SoCs). Wormhole flow control is widely used as the trans...
Ciprian Seiculescu, Srinivasan Murali, Luca Benini...
110
Voted
SIGCOMM
2010
ACM
15 years 1 months ago
QuagFlow: partnering Quagga with OpenFlow
Computing history has shown that open, multi-layer hardware and software stacks encourage innovation and bring costs down. Only recently this trend is meeting the networking world...
Marcelo Ribeiro Nascimento, Christian Esteve Rothe...