Sciweavers

815 search results - page 163 / 163
» Using non-functional requirements to systematically support ...
Sort
View
JUCS
2000
102views more  JUCS 2000»
13 years 5 months ago
Towards Two-Level Formal Modeling of Computer-Based Systems
: Embedded Computer-based Systems are becoming highly complex and hard to implement because of the large number of concerns the designers have to address. These systems are tightly...
Gabor Karsai, Greg Nordstrom, Ákos Lé...
ACL
2010
13 years 3 months ago
Hunting for the Black Swan: Risk Mining from Text
In the business world, analyzing and dealing with risk permeates all decisions and actions. However, to date, risk identification, the first step in the risk management cycle, has...
Jochen L. Leidner, Frank Schilder
EJWCN
2010
138views more  EJWCN 2010»
13 years 6 days ago
An Interference-Aware Admission Control Design for Wireless Mesh Networks
With the increasing popularity of wireless mesh networks (WMNs), the demand for multimedia services encompassing VoIP, multimedia streaming and interactive gaming is increasing rap...
Devu Manikantan Shila, Tricha Anjali
HPCA
2011
IEEE
12 years 9 months ago
Beyond block I/O: Rethinking traditional storage primitives
Over the last twenty years the interfaces for accessing persistent storage within a computer system have remained essentially unchanged. Simply put, seek, read and write have deļ¬...
Xiangyong Ouyang, David W. Nellans, Robert Wipfel,...
MOBIHOC
2007
ACM
14 years 4 months ago
A random perturbation-based scheme for pairwise key establishment in sensor networks
A prerequisite for secure communications between two sensor nodes is that these nodes exclusively share a pairwise key. Although numerous pairwise key establishment (PKE) schemes ...
Wensheng Zhang, Minh Tran, Sencun Zhu, Guohong Cao