Sciweavers

193 search results - page 18 / 39
» Conditional Dependence Networks in Requirements Engineering
Sort
View
ISCC
2003
IEEE
127views Communications» more  ISCC 2003»
15 years 5 months ago
Real-Time Multiple Description and Layered Encoded Video Streaming with Optimal Diverse Routing
Multiple Description (MD) and Layered Coding (LC) are two source-coding approaches proposed for adaptive and robust video streaming over lossy networks. Both streaming methods aim...
Ali C. Begen, Yucel Altunbasak, Özlem Ergun, ...
MOBIHOC
2006
ACM
15 years 11 months ago
Fundamental scaling laws for energy-efficient storage and querying in wireless sensor networks
We use a constrained optimization framework to derive fundamental scaling laws for both unstructured sensor networks (which use blind sequential search for querying) and structure...
Joon Ahn, Bhaskar Krishnamachari
ICSE
2009
IEEE-ACM
16 years 15 days ago
Tesseract: Interactive visual exploration of socio-technical relationships in software development
Software developers have long known that project success requires a robust understanding of both technical and social linkages. However, research has largely considered these inde...
Anita Sarma, Larry Maccherone, Patrick Wagstrom, J...
EUROMICRO
2009
IEEE
15 years 3 months ago
Composition of Self Descriptive Protocols for Future Network Architectures
The network protocols we use today have been introduced decades ago. Since then the whole Internet came to existence and with it a single protocol stack: TCP/IP. What was a good s...
Dennis Schwerdel, Abbas Siddiqui, Bernd Reuther, P...
CCS
2009
ACM
16 years 9 days ago
Semantic context aware security policy deployment
The successful deployment of a security policy is closely related not only to the complexity of the security requirements but also to the capabilities/functionalities of the secur...
Frédéric Cuppens, Joaquín Gar...