Sciweavers

4166 search results - page 679 / 834
» Automating the constraining process
Sort
View
113
Voted
NOMS
2008
IEEE
15 years 10 months ago
Dynamic inter-organizational cooperation setup in Circle-of-Trust environments
—The need for collaborative service provisioning across different providers’ domains is being addressed by Circles of Trust (CoT), whose members adhere to the same policies and...
Latifa Boursas, Vitalian A. Danciu
120
Voted
RTSS
2008
IEEE
15 years 10 months ago
Schedulability and Compatibility of Real Time Asynchronous Objects
Abstract—We apply automata theory to specifying behavioral interfaces of objects and show how to check schedulability and compatibility of real time asynchronous objects. The beh...
Mohammad Mahdi Jaghoori, Delphine Longuet, Frank S...
107
Voted
TRIDENTCOM
2008
IEEE
15 years 10 months ago
A flexible dual frequency testbed for RFID
This paper presents the setup of a testbed developed for the fast evaluation of RFID systems in two frequency domains. At the one hand the 13.56 MHz and at the other hand the 868 ...
Christoph Angerer, Martin Holzer 0002, Bastian Kne...
127
Voted
WACV
2008
IEEE
15 years 10 months ago
Tracking Down Under: Following the Satin Bowerbird
Sociobiologists collect huge volumes of video to study animal behavior (our collaborators work with 30,000 hours of video). The scale of these datasets demands the development of ...
Aniruddha Kembhavi, Ryan Farrell, Yuancheng Luo, D...
114
Voted
ACNS
2008
Springer
88views Cryptology» more  ACNS 2008»
15 years 10 months ago
On the Effectiveness of Internal Patching Against File-Sharing Worms
File-sharing worms have been terrorizing Peer-to-peer (P2P) systems in recent years. Existing defenses relying on users’ individual recoveries or limiting users’ file-sharing ...
Liang Xie, Hui Song, Sencun Zhu