Sciweavers

3119 search results - page 618 / 624
» Abstract Requirement Analysis in Multiagent System Design
Sort
View
RAID
2005
Springer
15 years 3 months ago
Sequence Number-Based MAC Address Spoof Detection
Abstract. The exponential growth in the deployment of IEEE 802.11based wireless LAN (WLAN) in enterprises and homes makes WLAN an attractive target for attackers. Attacks that expl...
Fanglu Guo, Tzi-cker Chiueh
ICEIS
2003
IEEE
15 years 2 months ago
Live-Representation Process Management
Abstract: We present the live-representation approach for managing and working in complex, dynamic business processes. In this approach, aspects of business-process modeling, proje...
Daniel D. Corkill, Zachary B. Rubinstein, Susan E....
ISCA
2000
IEEE
99views Hardware» more  ISCA 2000»
15 years 2 months ago
Transient fault detection via simultaneous multithreading
Smaller feature sizes, reduced voltage levels, higher transistor counts, and reduced noise margins make future generations of microprocessors increasingly prone to transient hardw...
Steven K. Reinhardt, Shubhendu S. Mukherjee
CORR
2010
Springer
180views Education» more  CORR 2010»
14 years 9 months ago
Dependability in Aggregation by Averaging
Abstract. Aggregation is an important building block of modern distributed applications, allowing the determination of meaningful properties (e.g. network size, total storage capac...
Paulo Jesus, Carlos Baquero, Paulo Sérgio A...
JSAC
2007
133views more  JSAC 2007»
14 years 9 months ago
On broadcasting with cooperative diversity in multi-hop wireless networks
Abstract— Cooperative diversity facilitates spatio-temporal communications without requiring the deployment of physical antenna arrays. While physical layer studies on cooperativ...
Gentian Jakllari, Srikanth V. Krishnamurthy, Micha...