Sciweavers

CSSE
2008
IEEE
13 years 11 months ago
Modeling and Implementation for Embedded DC Motor Ethernet Control System
—In this paper, a model of Embedded DC Motor Ethernet Control System is proposed with analysis on transmission time delay and data packet dropout. Based on this model, the ECS is...
Lingbo Zhu, Guanzhong Dai, Li Shin, Xuefang Lin-Sh...
CSSE
2008
IEEE
13 years 11 months ago
Generation of Executable Representation for Processor Simulation with Dynamic Translation
Instruction-Set Simulators (ISS) are indispensable tools for studying new architectures. There are several alternatives to achieve instruction set simulation, such as interpretive...
Jiajia Song, HongWei Hao, Claude Helmstetter, Vani...
CSSE
2008
IEEE
13 years 11 months ago
Study on Application of CAD Sonification
—The feedback of sonification on CAD analyzing information in addition to picture interface increases user’s accepting information and decreases the load of visual channel. Dat...
Zhang Yinnan, Cen Gang, Fang Zhigang
CSSE
2008
IEEE
13 years 11 months ago
The Relation of Version Control to Concurrent Programming
Version control helps coordinating a group of people working concurrently to achieve a shared objective. Concurrency control helps coordinating a group of threads working concurre...
Annette Bieniusa, Peter Thiemann, Stefan Wehr
CSSE
2008
IEEE
13 years 11 months ago
Constructing a Fractal P2P Network
—A Peer-to-Peer (P2P) network is a communication network constructed on application level, for the purpose of exchanging information among peers. Fractal, defined as an object or...
Changxiong Tang, Rui Wang
CSSE
2008
IEEE
13 years 11 months ago
Web Services Composition Method Based on OWL
—At present, Web services are created and updated on the fly. It has already beyond the human ability to analysis them and generate the composition plan manually. It is a problem...
Jike Ge, Yuhui Qiu, Shiqun Yin
CSSE
2008
IEEE
13 years 11 months ago
Embedding in Two Least Significant Bits with Wet Paper Coding
In this paper, we present three embedding schemes for extensions of least significant bit overwriting to both of the two lowest bit planes in digital images. Our approaches are in...
Xin Liao, Qiao-Yan Wen
CSSE
2008
IEEE
13 years 11 months ago
A Markov Game Theory-Based Risk Assessment Model for Network Information System
—Risk assessment is a very important tool to acquire a present and future security status of the network information system. Many risk assessment approaches consider the present ...
Cui Xiaolin, Xiaobin Tan, Zhang Yong, Hongsheng Xi
CSSE
2008
IEEE
13 years 11 months ago
Analysis of the Virtual Enterprise Partner Selection Based on Multi-agent System
: Today, virtual enterprise is regarded as the most competitive management model of enterprises that faces the resource of the globe. This paper proposed an instructor of remote ma...
Zunqi Yang, Hai Lin
CSSE
2008
IEEE
13 years 11 months ago
Designing and Verifying Communication Protocols Using Model Driven Architecture and Spin Model Checker
Abstract: The need of communication protocols in today’s environment increases as much as the network explores. Many new kinds of protocols, e.g. for information sharing, securit...
Prabhu Shankar Kaliappan, Hartmut Koenig, Vishnu K...