Sciweavers

5128 search results - page 1023 / 1026
» An Efficient Storage Manager
Sort
View
ISSRE
2010
IEEE
14 years 10 months ago
Automata-Based Verification of Security Requirements of Composite Web Services
— With the increasing reliance of complex real-world applications on composite web services assembled from independently developed component services, there is a growing need for...
Hongyu Sun, Samik Basu, Vasant Honavar, Robyn R. L...
TMC
2008
159views more  TMC 2008»
14 years 10 months ago
Protecting Location Privacy with Personalized k-Anonymity: Architecture and Algorithms
Continued advances in mobile networks and positioning technologies have created a strong market push for location-based applications. Examples include location-aware emergency resp...
Bugra Gedik, Ling Liu
GI
2010
Springer
14 years 9 months ago
Open Innovation Marketing. A Case Study
: Social networks and communities like facebook and myspace gain increasing importance in people's everyday lives. Companies start to see these platforms as a chance for commu...
Catharina van Delden, Nancy Wünderlich
IMC
2010
ACM
14 years 9 months ago
Characterizing radio resource allocation for 3G networks
3G cellular data networks have recently witnessed explosive growth. In this work, we focus on UMTS, one of the most popular 3G mobile communication technologies. Our work is the f...
Feng Qian, Zhaoguang Wang, Alexandre Gerber, Zhuoq...
MEMOCODE
2010
IEEE
14 years 9 months ago
Proving transaction and system-level properties of untimed SystemC TLM designs
Electronic System Level (ESL) design manages the complexity of todays systems by using abstract models. In this context Transaction Level Modeling (TLM) is state-of-theart for desc...
Daniel Große, Hoang M. Le, Rolf Drechsler
« Prev « First page 1023 / 1026 Last » Next »