Sciweavers

278 search results - page 55 / 56
» How Artifacts Support and Impede Requirements Communication
Sort
View
CORR
2007
Springer
153views Education» more  CORR 2007»
13 years 5 months ago
Power-Bandwidth Tradeoff in Dense Multi-Antenna Relay Networks
— We consider a dense fading multi-user network with multiple active multi-antenna source-destination pair terminals communicating simultaneously through a large common set of K ...
Ozgur Oyman, Arogyaswami Paulraj
CCS
2007
ACM
13 years 12 months ago
Memsherlock: an automated debugger for unknown memory corruption vulnerabilities
Software vulnerabilities have been the main contributing factor to the Internet security problems such as fast spreading worms. Among these software vulnerabilities, memory corrup...
Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu
ISM
2006
IEEE
103views Multimedia» more  ISM 2006»
13 years 11 months ago
A Study of Collaborative Dancing in Tele-immersive Environments
We first present the tele-immersive environments developed jointly by University of Illinois at Urbana-Champaign and University of California at Berkeley. The environment feature...
Zhenyu Yang, Bin Yu, Wanmin Wu, Klara Nahrstedt, R...
DATE
2010
IEEE
149views Hardware» more  DATE 2010»
13 years 11 months ago
Integrated end-to-end timing analysis of networked AUTOSAR-compliant systems
—As Electronic Control Units (ECUs) and embedded software functions within an automobile keep increasing in number, the scale and complexity of automotive embedded systems is gro...
Karthik Lakshmanan, Gaurav Bhatia, Ragunathan Rajk...
HIPS
1998
IEEE
13 years 10 months ago
Constructive and Adaptable Distributed Shared Memory
Distributed shared memory (DSM) is a paradigm for programming distributed systems, which provides an alternative to the message passing model. DSM offers the agents of the system ...
Jordi Bataller, José M. Bernabéu-Aub...