Sciweavers

1791 search results - page 171 / 359
» Behavioral Operations
Sort
View
SACMAT
2006
ACM
15 years 10 months ago
Towards reasonability properties for access-control policy languages
The growing importance of access control has led to the definition of numerous languages for specifying policies. Since these languages are based on different foundations, langua...
Michael Carl Tschantz, Shriram Krishnamurthi
AUTOID
2005
IEEE
15 years 10 months ago
Impedance Matching Concepts in RFID Transponder Design
In this paper, we analyze impedance matching concepts in passive radio frequency identification (RFID) transponders, which are powered by the incoming RF energy and consist of an...
K. V. S. Rao, Pavel V. Nikitin, Sander F. Lam
CRV
2005
IEEE
208views Robotics» more  CRV 2005»
15 years 10 months ago
Topology Inference for a Vision-Based Sensor Network
In this paper we describe a technique to infer the topology and connectivity information of a network of cameras based on observed motion in the environment. While the technique c...
Dimitri Marinakis, Gregory Dudek
DATE
2005
IEEE
104views Hardware» more  DATE 2005»
15 years 10 months ago
A SoC Design Methodology Involving a UML 2.0 Profile for SystemC
In this paper, we present a SoC design methodology joining the capabilities of UML and SystemC to operate at systemlevel. We present a UML 2.0 profile of the SystemC language expl...
Elvinia Riccobene, Patrizia Scandurra, Alberto Ros...
IPPS
2005
IEEE
15 years 9 months ago
A Measure of Robustness Against Multiple Kinds of Perturbations
Parallel and distributed heterogeneous computing systems may operate in an environment that undergoes unpredictable changes causing certain system performance features to degrade....
Behdis Eslamnour, Shoukat Ali