Token-ordered LRU: an effective page replacement policy and its implementation in Linux systems Fulltext Access 25 Pages 2005
GASepo-a software solution for quantitative analysis of digital images in Epo doping control Fulltext Access 25 Pages 2005
Multi-hop cellular networks: Architecture and protocols for best-effort and real-time communication Fulltext Access 25 Pages 2005
Using an expert panel to validate a requirements process improvement model Fulltext Access 25 Pages 2005
Modelling hypermedia and web applications: the Ariadne Development Method Fulltext Access 25 Pages 2005
Finding the most interesting correlations in a database: how hard can it be? Fulltext Access 26 Pages 2005
Analysis of priority channel assignment schemes in mobile cellular communication systems: a spectral theory approach Fulltext Access 26 Pages 2005
Translating relational schema into XML schema definition with data semantic preservation and XSD graph Fulltext Access 26 Pages 2005
Establishing local temporal heap safety properties with applications to compile-time memory management Fulltext Access 26 Pages 2005
Integrated program debugging, verification, and optimization using abstract interpretation (and the Ciao system preprocessor) Fulltext Access 26 Pages 2005
An object based algebra for specifying a fault tolerant software architecture Fulltext Access 27 Pages 2005
Stochastic fluid flow models for determining optimal switching thresholds Fulltext Access 28 Pages 2005
Encapsulation and behavioral inheritance in a synchronous model of computation for embedded system services adaptation Fulltext Access 29 Pages 2005
Specification and validation of process constraints for flexible workflows Fulltext Access 30 Pages 2005
A comprehensive framework for modeling set-based business rules during conceptual database design Fulltext Access 30 Pages 2005
Quality-of-service and error control techniques for mesh-based network-on-chip architectures Fulltext Access 30 Pages 2005
De Bruijn's syntax and reductional behaviour of λ-terms: the typed case Fulltext Access 31 Pages 2005
Verifying security protocols with PVS: widening the rank function approach Fulltext Access 32 Pages 2005
Sample-path large deviations for generalized processor sharing queues with Gaussian inputs Fulltext Access 32 Pages 2005
Unifying simulatability definitions in cryptographic systems under different timing assumptions Fulltext Access 32 Pages 2005
Long range dependence in network traffic and the closed loop behaviour of buffers under adaptive window control Fulltext Access 33 Pages 2005
Abstraction and resolution modulo AC: How to verify Diffie-Hellman-like protocols automatically Fulltext Access 33 Pages 2005
A methodology for detailed performance modeling of reduction computations on SMP machines Fulltext Access 33 Pages 2005
Performance evaluation of an open distributed platform for realistic traffic generation Fulltext Access 34 Pages 2005
XML stream transformer generation through program composition and dependency analysis Fulltext Access 34 Pages 2005
Call-burst blocking of ON-OFF traffic sources with retrials under the complete sharing policy Fulltext Access 34 Pages 2005
A discrete-time UML semantics for concurrency and communication in safety-critical applications Fulltext Access 35 Pages 2005
A symbolic decision procedure for cryptographic protocols with time stamps Fulltext Access 35 Pages 2005
A static analysis of cryptographic processes: the denotational approach Fulltext Access 36 Pages 2005
Completeness, decidability and complexity of entailment for RDF Schema and a semantic extension involving the OWL vocabulary Fulltext Access 37 Pages 2005
Computable total functions on metric algebras, universal algebraic specifications and dynamical systems Fulltext Access 38 Pages 2005
An “abstract process” approach to algebraic dynamic architecture description Fulltext Access 38 Pages 2005
Static insertion of safe and effective memory reuse commands into ML-like programs Fulltext Access 38 Pages 2005
Generating two-terminal directed acyclic graphs with a given complexity index by constraint logic programming Fulltext Access 39 Pages 2005
Weighted pushdown systems and their application to interprocedural dataflow analysis Fulltext Access 58 Pages 2005
OpenMOLE, a workflow engine specifically tailored for the distributed exploration of simulation models Fulltext Access 10 Pages 1990