Sciweavers

6253 search results - page 314 / 1251
» Use Case Modeling Guidelines
Sort
View
DBISP2P
2003
Springer
79views Database» more  DBISP2P 2003»
15 years 9 months ago
SIL: Modeling and Measuring Scalable Peer-to-Peer Search Networks
The popularity of peer-to-peer search networks continues to grow, even as the limitations to the scalability of existing systems become apparent. We propose a simple model for sear...
Brian F. Cooper, Hector Garcia-Molina
118
Voted
WICON
2008
15 years 5 months ago
A fluid-flow model for backlog-based CSMA policies
We present a fluid flow model to analyze backlog-based CSMA policies. The model is obtained using a CSMA fixed point approximation that has been recently proposed and analyzed. We...
Atilla Eryilmaz, Peter Marbach, Asuman E. Ozdaglar
SC
2009
ACM
15 years 10 months ago
Pipeline-centric provenance model
In this paper we propose a new provenance model which is tailored to a class of workflow-based applications. We motivate the approach with use cases from the astronomy community. ...
Paul T. Groth, Ewa Deelman, Gideon Juve, Gaurang M...
WSC
1989
15 years 5 months ago
Adaptive distribution of model components via congestion measures
One of the factors affecting the performance of distributed simulation models is the assignment of logical processes to processors. This paper outlines a dynamic allocation scheme...
Murali S. Shanker, W. David Kelton, Rema Padman
MEMOCODE
2005
IEEE
15 years 9 months ago
Three-valued logic in bounded model checking
In principle, bounded model checking (BMC) leads to semidecision procedures that can be used to verify liveness properties and to falsify safety properties. If the procedures fail...
Tobias Schüle, Klaus Schneider