Nome |
# |
Connectivity and energy-aware preorders for mobile ad-hoc networks, file e4239ddc-7429-7180-e053-3705fe0a3322
|
383
|
Behavioural equivalences and interference metrics for mobile ad-hoc networks, file e4239ddb-69fc-7180-e053-3705fe0a3322
|
349
|
null, file e4239ddc-1722-7180-e053-3705fe0a3322
|
313
|
Performance evaluation of AQM techniques with heterogeneous traffic, file e4239ddb-e330-7180-e053-3705fe0a3322
|
311
|
Persistent Stochastic Non-Interference, file e4239ddc-c495-7180-e053-3705fe0a3322
|
306
|
Dynamic Control of the Join-Queue Lengths in Saturated Fork-Join Stations, file e4239ddb-e977-7180-e053-3705fe0a3322
|
300
|
Guest editor's forewords: Special issue on Valuetools 2017, file e4239ddd-760a-7180-e053-3705fe0a3322
|
279
|
Priority-based bandwidth allocation in wireless sensor networks, file e4239ddc-0829-7180-e053-3705fe0a3322
|
231
|
Model Checking Adaptive Service Compositions, file e4239ddb-351e-7180-e053-3705fe0a3322
|
208
|
Quantitative Analysis of Concurrent Reversible Computations, file e4239ddb-bbcf-7180-e053-3705fe0a3322
|
203
|
A Product-Form Model for the Performance Evaluation of a Bandwidth Allocation Strategy in WSNs, file e4239ddc-a8ab-7180-e053-3705fe0a3322
|
172
|
Frequency scaling in multilevel queues, file e4239dde-5acf-7180-e053-3705fe0a3322
|
143
|
On the Use of Proof-of-Work in Permissioned Blockchains: Security and Fairness, file e4239dde-a1b8-7180-e053-3705fe0a3322
|
91
|
Workload Prediction in BTC Blockchain and Application to the Confirmation Time Estimation, file 16c20569-ba70-491a-b644-81eb8efdf73d
|
73
|
Reasoning About Proportional Lumpability, file 9a73c89e-9c1c-456c-8cab-2311688f4511
|
71
|
Applying Reversibility Theory for the Performance Evaluation of Reversible Computations, file e4239dde-13c8-7180-e053-3705fe0a3322
|
29
|
Lumping-based equivalences in Markovian automata: Algorithms and applications to product-form analyses, file e4239dde-01e0-7180-e053-3705fe0a3322
|
26
|
A Product-Form Model for the Performance Evaluation of a Bandwidth Allocation Strategy in WSNs, file e4239dde-0741-7180-e053-3705fe0a3322
|
26
|
Analysis of the confirmation time in proof-of-work blockchains, file 3e8fa158-4187-489f-bf6a-625daab6c5c8
|
11
|
On the relations between Markov chain lumpability and reversibility, file e4239ddd-fa54-7180-e053-3705fe0a3322
|
11
|
A Product-form Model for the Analysis of Systems with Aging Objects, file e4239ddb-b5f4-7180-e053-3705fe0a3322
|
8
|
Analysis of ECN/RED and SAP-LAW with simultaneous TCP and UDP traffic, file e4239dde-01c0-7180-e053-3705fe0a3322
|
7
|
Theoretical and experimental evaluation of the two-level processor sharing discipline for TCP flows, file e4239ddd-fa5b-7180-e053-3705fe0a3322
|
6
|
Power control in saturated fork-join queueing systems, file e4239ddd-fc6d-7180-e053-3705fe0a3322
|
5
|
Fair workload distribution for multi-server systems with pulling strategies, file e4239ddd-fc72-7180-e053-3705fe0a3322
|
5
|
Lumping-based equivalences in Markovian automata: Algorithms and applications to product-form analyses, file e4239dde-014f-7180-e053-3705fe0a3322
|
4
|
Reverse Bisimilarity vs. Forward Bisimilarity, file 14cd1d27-161b-4d85-b565-f138fa63f90c
|
3
|
Neural Networks Reduction via Lumping, file b85a67bb-ac61-4918-ba5d-5a31fe854fae
|
3
|
Unwinding in Information Flow Security, file e4239ddb-2e02-7180-e053-3705fe0a3322
|
2
|
Product-forms for Probabilistic Input/Output Automata, file e4239ddc-1a60-7180-e053-3705fe0a3322
|
2
|
Proportional Lumpability, file e4239ddd-76ce-7180-e053-3705fe0a3322
|
2
|
A Queueing Model that Works Only on the Biggest Jobs, file e4239ddd-bd74-7180-e053-3705fe0a3322
|
2
|
Verifier’s Dilemma in Ethereum Blockchain: A Quantitative Analysis, file 8edd1f49-3922-4b38-b35a-b9d53924e872
|
1
|
Selfish Mining in Public Blockchains: A Quantitative Analysis, file 949a44d8-cf7a-43e8-bcfd-9a50ed1db41a
|
1
|
Proportional lumpability and proportional bisimilarity, file b8febab2-42b6-43d5-a902-6eed9db46660
|
1
|
Information Flow Security in Dynamic Contexts, file e4239ddb-2dfc-7180-e053-3705fe0a3322
|
1
|
Specification-based Automatic Verification of Prolog Programs, file e4239ddb-2e09-7180-e053-3705fe0a3322
|
1
|
A Theory of Adaptable Contract-based Service Composition., file e4239ddb-31a0-7180-e053-3705fe0a3322
|
1
|
A Process Calculus for Energy-Aware Multicast Communications of Mobile Ad-Hoc Networks, file e4239ddb-40be-7180-e053-3705fe0a3322
|
1
|
Autoreversibility: exploiting symmetries in Markov chains, file e4239ddb-69fa-7180-e053-3705fe0a3322
|
1
|
Performance Analysis and Formal Verification of Cognitive Wireless Networks, file e4239ddb-6a07-7180-e053-3705fe0a3322
|
1
|
Aggregation and Truncation of Reversible Markov Chains Modulo State Renaming, file e4239ddc-73c3-7180-e053-3705fe0a3322
|
1
|
Biased processor sharing in fork-join queues, file e4239ddd-0e1e-7180-e053-3705fe0a3322
|
1
|
Dynamic resource allocation in fork-join queues, file e4239ddd-ba16-7180-e053-3705fe0a3322
|
1
|
A Matlab Toolkit for the Analysis of Two-Level Processor Sharing Queues, file e4239dde-60f5-7180-e053-3705fe0a3322
|
1
|
Totale |
3.598 |