COHESION — A microkernel based Desktop Grid platform for irregular task-parallel applications Fulltext Access 17 Pages 2008
A Compositional Automata-based Approach for Model Checking Multi-Agent Systems Fulltext Access 17 Pages 2008
A resource aware software partitioning algorithm based on mobility constraints in pervasive grid environments Fulltext Access 18 Pages 2008
Constrained Simulations, Nested Simulation Semantics and Counting Bisimulations Fulltext Access 18 Pages 2008
Specification and Verification of the IEEE 802.11 Medium Access Control and an Analysis of its Applicability to Real-Time Systems Fulltext Access 18 Pages 2008
Directional dynamics for cellular automata: A sensitivity to initial condition approach Fulltext Access 18 Pages 2008
Optimization techniques for propositional intuitionistic logic and their implementation Fulltext Access 18 Pages 2008
New constructions for provably-secure time-bound hierarchical key assignment schemes Fulltext Access 18 Pages 2008
Approximating the online set multicover problems via randomized winnowing Fulltext Access 18 Pages 2008
A macroeconomic model for resource allocation in large-scale distributed systems Fulltext Access 18 Pages 2008
Generalized linear mixed model with a penalized Gaussian mixture as a random effects distribution Fulltext Access 18 Pages 2008
Estimation in bivariate nonnormal distributions with stochastic variance functions Fulltext Access 18 Pages 2008
Point estimates for variance-structure parameters in Bayesian analysis of hierarchical models Fulltext Access 18 Pages 2008
A generic, formal language-based methodology for hierarchical floorplanning-placement Fulltext Access 18 Pages 2008
A novel distributed approach to robust fault detection and identification Fulltext Access 18 Pages 2008
A dimensionality reduction technique for efficient time series similarity analysis Fulltext Access 18 Pages 2008
Effective protocols for kNN search on broadcast multi-dimensional index trees Fulltext Access 18 Pages 2008
Behavioral matchmaking for service retrieval: Application to conversation protocols Fulltext Access 18 Pages 2008
A Formal Model of Memory Peculiarities for the Verification of Low-Level Operating-System Code Fulltext Access 18 Pages 2008
Pervasive Compiler Verification – From Verified Programs to Verified Systems Fulltext Access 18 Pages 2008
On the Approximation of Stochastic Concurrent Constraint Programming by Master Equation Fulltext Access 18 Pages 2008