نتایج جستجو برای: token

تعداد نتایج: 6257  

2010
Rasmus H. Fogh Wayne Boucher John M.C. Ionides Wim F. Vranken Tim J. Stevens Ernest D. Laue

Value+locard: Int = 0+hicard: Int = 1+is Ordered: Boolean = Fals e+is Unique: Boolean = True +checkValid()ClassElement+visibili ty: Token = public_vis+changeabil ity: Token = changeable+is Abstract: Boolean = Fals e+is Derived: Boolean = Fals e+is Automatic: Boolean = False+is Implementation: Boolean = False+baseName: Token +checkValid()+acces...

Journal: :Information Processing Letters 1998

Journal: :RAIRO - Theoretical Informatics and Applications 1995

Journal: :IEICE Transactions on Information and Systems 2008

2015
Reuven Cohen Adrian Segall

The present paper describes a new media access control protocol, called the multiple token protocol, for high-speed ring networks. The purpose of this protocol is to increase the throughput under a heavy load and to decrease the access delay under a light load ofthe token-ring protocol. The protocol maintains several logical token-rings in the single physical ring. The number of logical rings c...

2005
Ariel Daliot Danny Dolev

There is an abundance of writing about Token Circulation (or leader election). Much of the work is dedicated to self-stabilizing Token Circulation, ever since the publishing of Dijkstra’s seminal paper. Few of the papers focus on the Byzantine fault model and, to the best of our knowledge, there is no self-stabilizing Token Circulation algorithm that tolerates Byzantine faults. In this paper, w...

Journal: :Journal of the experimental analysis of behavior 2001
J J Widholm A Silberberg S R Hursh A A Imam F R Warren-Boulton

Each of 2 monkeys typically earned their daily food ration by depositing tokens in one of two slots. Tokens deposited in one slot dropped into a bin where they were kept (token kept). Deposits to a second slot dropped into a bin where they could be obtained again (token returned). In Experiment 1, a fixed-ratio (FR) 5 schedule that provided two food pellets was associated with each slot. Both m...

Journal: :IJAHUC 2010
Mahfoud Benchaïba Mohamed Ahmed-Nacer

In this paper, we describe a new token based h-out of-k mutual exclusion protocol for mobile ad hoc networks. This protocol does neither use the routing layer nor a logical structure and agrees requests based on their distances away to the token, their olds, and there resources number. A request is sent on the routes of the nodes for which a request is present in the local queue, with a dynamic...

2003
Rik Eshuis Juliane Dehnert

Petri nets are widely used for modeling and analyzing workflows. Using the token-game semantics, Petri net-based workflow models can be analyzed before the model is actually used at run time. At run time, a workflow model prescribes behavior of a reactive system (the workflow engine). But the token-game semantics models behavior of closed, active systems. Thus, the token-game semantics behavior...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید