Sciweavers

9210 search results - page 1511 / 1842
» Analyzing Real-Time Systems
Sort
View
ICC
2007
IEEE
15 years 11 months ago
Overlay Partition: Iterative Detection and Proactive Recovery
— Overlay networks provide infrastructures for a large variety of Internet applications, like file sharing, online gaming, and multimedia streaming. However, these networks ofte...
Tongqing Qiu, Edward Chan, Guihai Chen
100
Voted
ICC
2007
IEEE
128views Communications» more  ICC 2007»
15 years 11 months ago
On the Acquisition Ambiguity for Galileo BOC(n, n) Modulated Signals
— Binary Offset Carrier, BOC, modulated signals are at the moment candidates both for new civil (free) signal in GPS update and for part of the European Global Navigation Satelli...
Giuseppe Avellone, Maristella Frazzetto, Ettore Me...
ICDCS
2007
IEEE
15 years 11 months ago
Testing Security Properties of Protocol Implementations - a Machine Learning Based Approach
Security and reliability of network protocol implementations are essential for communication services. Most of the approaches for verifying security and reliability, such as forma...
Guoqiang Shu, David Lee
ICDE
2007
IEEE
114views Database» more  ICDE 2007»
15 years 11 months ago
Ranking Issues for Information Integration
Ranking of query/search answers, although introduced by early information retrieval systems, has become mandatory for internet searches. When the answers of a query or search are ...
Aditya Telang, Roochi Mishra, Sharma Chakravarthy
ICEBE
2007
IEEE
151views Business» more  ICEBE 2007»
15 years 11 months ago
Systematic Security Analysis for Service-Oriented Software Architectures
Due to the dramatic increase in intrusive activities architecture security analysis and design has emerged as an important aspect of the development of software services. It is a ...
Yanguo Liu, Issa Traoré
« Prev « First page 1511 / 1842 Last » Next »