Sciweavers

220 search results - page 16 / 44
» Verifying a signature architecture: a comparative case study
Sort
View
PADL
2009
Springer
16 years 10 days ago
Declarative Network Verification
Abstract. In this paper, we present our initial design and implementation of a declarative network verifier (DNV). DNV utilizes theorem proving, a well established verification tec...
Anduo Wang, Prithwish Basu, Boon Thau Loo, Oleg So...
WWW
2008
ACM
16 years 11 days ago
Efficiently querying rdf data in triple stores
Efficiently querying RDF [1] data is being an important factor in applying Semantic Web technologies to real-world applications. In this context, many efforts have been made to st...
Ying Yan, Chen Wang, Aoying Zhou, Weining Qian, Li...
INFOCOM
1997
IEEE
15 years 3 months ago
Performance Analysis of Multicast Flow Control Algorithms over Combined Wired/Wireless Networks
Abstract—A multicast flow control framework for data traffic traversing both a wired and wireless network is proposed. Markov-modulated fluid (MMF) models are used for the rec...
Huayan Amy Wang, Mischa Schwartz
ICNS
2008
IEEE
15 years 6 months ago
SLA Monitoring and Management Framework for Telecommunication Services
This paper presents SLA monitoring and management framework for telecommunication services. The basic requirements of this class of systems are specified and verified in context o...
Jacek Kosinski, Piotr Nawrocki, Dominik Radziszows...
BMCBI
2010
95views more  BMCBI 2010»
14 years 11 months ago
Modelling p-value distributions to improve theme-driven survival analysis of cancer transcriptome datasets
Background: Theme-driven cancer survival studies address whether the expression signature of genes related to a biological process can predict patient survival time. Although this...
Esteban Czwan, Benedikt Brors, David Kipling