Sciweavers

2838 search results - page 215 / 568
» Verifying Controlled Components
Sort
View
91
Voted
CN
1999
119views more  CN 1999»
15 years 12 days ago
Internet Telephony: Architecture and Protocols - an IETF Perspective
Internet telephony offers the opportunity to design a global multimedia communications system that may eventually replace the existing telephony infrastructure. We describe the up...
Henning Schulzrinne, Jonathan Rosenberg
110
Voted
CIKM
2011
Springer
14 years 21 days ago
Adaptive term frequency normalization for BM25
A key component of BM25 contributing to its success is its sub-linear term frequency (TF) normalization formula. The scale and shape of this TF normalization component is controll...
Yuanhua Lv, ChengXiang Zhai
ECOWS
2008
Springer
15 years 2 months ago
Beyond Soundness: On the Semantic Consistency of Executable Process Models
Executable business process models build on the specification of process activities, their implemented business functions (e.g., Web services) and the control flow between these a...
Ingo Weber, Jörg Hoffmann, Jan Mendling
106
Voted
GPCE
2007
Springer
15 years 7 months ago
Aspects of availability
In this paper, we propose a domain-specific aspect language to prevent the denials of service caused by resource management. Our aspects specify availability policies by enforcin...
Pascal Fradet, Stéphane Hong Tuan Ha
81
Voted
SEFM
2005
IEEE
15 years 6 months ago
Precise Analysis of Memory Consumption using Program Logics
Memory consumption policies provide a means to control resource usage on constrained devices, and play an important role in ensuring the overall quality of software systems, and i...
Gilles Barthe, Mariela Pavlova, Gerardo Schneider