Sciweavers

2485 search results - page 359 / 497
» A Communicating Tree Model for Generating Network Applicatio...
Sort
View
134
Voted
DATE
2004
IEEE
130views Hardware» more  DATE 2004»
15 years 7 months ago
Utilizing Formal Assertions for System Design of Network Processors
System level modeling with executable languages such as C/C++ has been crucial in the development of large electronic systems from general processors to application specific desig...
Xi Chen, Yan Luo, Harry Hsieh, Laxmi N. Bhuyan, Fe...
147
Voted
AAAI
2008
15 years 6 months ago
Resource Constrained Distributed Constraint Optimization with Virtual Variables
Cooperative problem solving with resource constraints are important in practical multi-agent systems. Resource constraints are necessary to handle practical problems including dis...
Toshihiro Matsui, Hiroshi Matsuo, Marius Silaghi, ...
131
Voted
INFOCOM
2010
IEEE
15 years 2 months ago
Refresh: Weak Privacy Model for RFID Systems
—Privacy-Preserving Authentication (PPA) is crucial for Radio Frequency Identifcation (RFID)-enabled applications. Without appropriate formal privacy models, it is difficult for...
Li Lu, Yunhao Liu, Xiang-Yang Li
164
Voted
MIDDLEWARE
2007
Springer
15 years 10 months ago
Domain-based context management for dynamic and evolutionary environments
Research in context-aware computing has produced a number of application prototypes, frameworks, middlewares and models for describing context. However, development of ubiquitous ...
Ricardo Couto Antunes da Rocha, Markus Endler
112
Voted
EDBT
2009
ACM
104views Database» more  EDBT 2009»
15 years 10 months ago
A query processor for prediction-based monitoring of data streams
Networks of sensors are used in many different fields, from industrial applications to surveillance applications. A common feature of these applications is the necessity of a mo...
Sergio Ilarri, Ouri Wolfson, Eduardo Mena, Arantza...