Sciweavers

8655 search results - page 1294 / 1731
» Challenges for Trusted Computing
Sort
View
MUE
2008
IEEE
116views Multimedia» more  MUE 2008»
15 years 10 months ago
A Novel Technique for Real-Time Internet Radio Recorder on Non-DSP Embedded System
The capability of providing real-time multimedia player over the Internet is an important future application for embedded system. However, the main challenge of such an applicatio...
Lain-Jing Hwang, Chien-Chou Shih, I-Ting Kuo
RAM
2008
IEEE
137views Robotics» more  RAM 2008»
15 years 10 months ago
Middleware for Robotics: A Survey
—The field of robotics relies heavily on various technologies such as mechatronics, computing systems, and wireless communication. Given the fast growing technological progress i...
Nader Mohamed, Jameela Al-Jaroodi, Imad Jawhar
SRDS
2008
IEEE
15 years 10 months ago
Towards Reliable Reputations for Dynamic Networked Systems
A new generation of distributed systems and applications rely on the cooperation of diverse user populations motivated by self-interest. While they can utilize “reputation syste...
Gayatri Swamynathan, Ben Y. Zhao, Kevin C. Almerot...
TASE
2008
IEEE
15 years 10 months ago
Bounded Model Checking of Compositional Processes
Verification techniques like SAT-based bounded model checking have been successfully applied to a variety of system models. Applying bounded model checking to compositional proce...
Jun Sun 0001, Yang Liu 0003, Jin Song Dong, Jing S...
WCNC
2008
IEEE
15 years 10 months ago
A Stochastic Model for Misbehaving Relays in Cooperative Diversity
—Existing cooperative diversity protocols are designed with the inherent assumption that users exhibit cooperative behavior all the time. However, in a practical cooperative wire...
Sintayehu Dehnie, Nasir D. Memon
« Prev « First page 1294 / 1731 Last » Next »