Least upper bounds for probability measures and their applications to abstractions. | 5 | 0.45 | 2014 |
Placement in Clouds for Application-Level Latency Requirements | 8 | 0.59 | 2012 |
The personal cloud: design, architecture and matchmaking algorithms for resource management | 0 | 0.34 | 2012 |
Mitigating High Latency Outliers for Cloud-Based Telecommunication Services | 0 | 0.34 | 2012 |
Behavior based service composition | 0 | 0.34 | 2011 |
Optimal Resource Allocation in Clouds | 50 | 2.50 | 2010 |
Optimal Resource Allocation for Batch Testing | 3 | 0.62 | 2009 |
Portable call agent: A model for rapid development and emulation of network services | 2 | 0.46 | 2008 |
Passive mid-stream monitoring of real-time properties | 3 | 0.39 | 2005 |
Expected convergence properties of BGP | 7 | 0.53 | 2005 |
Message Ferrying for Constrained Scenarios | 10 | 0.85 | 2005 |
Network simulation via hybrid system modeling: a time-stepped approach. | 3 | 0.39 | 2005 |
A new coding scheme for the noisy-channel Slepian-Wolf problem: separate design and joint decoding | 6 | 0.52 | 2004 |
Correct Passive Testing Algorithms and Complete Fault Coverage | 5 | 0.45 | 2003 |
Topology inference in the presence of anonymous routers | 59 | 2.37 | 2003 |
Topology discovery for public IPv6 networks | 21 | 0.98 | 2003 |
Interaction points: exploiting operating system mechanisms for inter-component communications | 1 | 0.35 | 2002 |
Foundations for Circular Compositional Reasoning | 10 | 0.55 | 2001 |
A Conceptual Framework for Network Management Event Correlation and Filtering Systems. | 37 | 3.34 | 1999 |
A calculus for dynamic customization of virtual environments | 0 | 0.34 | 1999 |
Effective Models of Polymorphism, Subtyping and Recursion (Extended Abstract) | 2 | 1.08 | 1996 |
An interpretation of objects and object types | 26 | 1.20 | 1996 |
Isolating side effects in sequential languages | 10 | 0.85 | 1995 |
Standard ML–NJ Weak Polymorphism and Imperative Constructs | 10 | 3.27 | 1993 |