Results 61 to 70 of about 68,865 (316)

Refinement Calculus of Reactive Systems

open access: yes, 2014
Refinement calculus is a powerful and expressive tool for reasoning about sequential programs in a compositional manner. In this paper we present an extension of refinement calculus for reactive systems.
Preoteasa, Viorel, Tripakis, Stavros
core   +1 more source

Relating BIP and Reo [PDF]

open access: yes, 2015
Coordination languages simplify design and development of concurrent systems. Particularly, exogenous coordination languages, like BIP and Reo, enable system designers to express the interactions among components in a system explicitly.
Arbab, Farhad   +3 more
core   +5 more sources

Packet Transactions: High-level Programming for Line-Rate Switches

open access: yes, 2016
Many algorithms for congestion control, scheduling, network measurement, active queue management, security, and load balancing require custom processing of packets as they traverse the data plane of a network switch. To run at line rate, these data-plane
Alizadeh, Mohammad   +8 more
core   +1 more source

The Interface Between Australia's Aged Care System and the National Disability Insurance Scheme: Population Perspectives

open access: yesAustralian Journal of Social Issues, EarlyView.
ABSTRACT The interface between Australia's aged care and disability systems has come into sharper focus with the 2023 Review of the National Disability Insurance Scheme recommendation to retain the upper age limit for entry and the introduction of an age criterion for assessment in the Aged Care Act 2024. Both are set at age 65.
Anna L. Howe
wiley   +1 more source

Search and Placement in Tiered Cache Networks

open access: yes, 2016
Content distribution networks have been extremely successful in today's Internet. Despite their success, there are still a number of scalability and performance challenges that motivate clean slate solutions for content dissemination, such as content ...
Domingues, Guilherme   +4 more
core   +1 more source

Trauma‐Informed Practice in Welfare‐to‐Work and Employment Services: A Scoping Review

open access: yesAustralian Journal of Social Issues, EarlyView.
ABSTRACT There is increasing recognition within welfare services, including employment services, that many participants may have histories of trauma. Research suggests that experiences of trauma not only impact individuals' psychosocial health but also vocational elements such as job performance, employability, career progression, and financial ...
Emily Corbett   +3 more
wiley   +1 more source

Best of Two Local Models: Local Centralized and Local Distributed Algorithms [PDF]

open access: yes, 2014
We consider two models of computation: centralized local algorithms and local distributed algorithms. Algorithms in one model are adapted to the other model to obtain improved algorithms.
Even, Guy, Medina, Moti, Ron, Dana
core  

Independence in Europe: Secession, Sovereignty, and the European Union [PDF]

open access: yes, 2009
The aim of this thesis is to explore the experiences of four cohorts of students from their first semester until one year after graduation, with the focus on how they perceive their opportunities to influence their study conditions transition to work ...
Connolly, Christopher K.
core   +2 more sources

Don't Worry About Her; Intersectionality, and the Role of Systems and Structures in the Embodied Experiences of Young Women's Use of Violence

open access: yesAustralian Journal of Social Issues, EarlyView.
ABSTRACT Systems and structures designed to protect and support young people, specifically (in this paper) young women, are ironically the same systems that maintain gender disparity. Consequently, this has influenced the embodied identities of young women who experience and use violence. Such systemic and structural intersectionality has impacted upon
Louise Rak   +3 more
wiley   +1 more source

Machine Learning DDoS Detection for Consumer Internet of Things Devices

open access: yes, 2018
An increasing number of Internet of Things (IoT) devices are connecting to the Internet, yet many of these devices are fundamentally insecure, exposing the Internet to a variety of attacks. Botnets such as Mirai have used insecure consumer IoT devices to
Apthorpe, Noah   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy