Sciweavers

1477 search results - page 79 / 296
» Token flow control
Sort
View
121
Voted
SAM
2000
102views Hardware» more  SAM 2000»
15 years 2 months ago
Test Generation Based On Control And Data Dependencies Within Multi-Process SDL Specifications
Control and data flow aspects of a distributed system can be identified through the analysis of control and data dependencies that exist not only within processes, but also across...
Olaf Henniger, Hasan Ural
132
Voted
E4MAS
2006
Springer
15 years 4 months ago
Urban Traffic Control with Co-Fields
Traffic control can be regarded as a multiagent application in which car-agents and traffic-light-agents need to coordinate with each other to optimize the traffic flow and to avoi...
Marco Camurri, Marco Mamei, Franco Zambonelli
133
Voted
TVCG
2012
210views Hardware» more  TVCG 2012»
13 years 3 months ago
A 2D Flow Visualization User Study Using Explicit Flow Synthesis and Implicit Task Design
—This paper presents a 2D flow visualization user study that we conducted using new methodologies to increase the objectiveness. We evaluated grid-based variable-size arrows, eve...
Zhanping Liu, Shangshu Cai, J. Edward Swan II, Rob...
99
Voted
SIGMETRICS
2000
ACM
107views Hardware» more  SIGMETRICS 2000»
15 years 5 months ago
Detecting shared congestion of flows via end-to-end measurement
Current Internet congestion control protocols operate independently on a per-flow basis. Recent work has demonstrated that cooperative congestion control strategies between flow...
Dan Rubenstein, James F. Kurose, Donald F. Towsley
IFIP
2010
Springer
14 years 8 months ago
Cryptographic Enforcement of Role-Based Access Control
Many cryptographic schemes have been designed to enforce information flow policies. However, enterprise security requirements are often better encoded, or can only be encoded, usin...
Jason Crampton