Sciweavers

7557 search results - page 1503 / 1512
» Constraints as a design pattern
Sort
View
CASES
2010
ACM
14 years 8 months ago
Low cost multicast authentication via validity voting in time-triggered embedded control networks
Wired embedded networks must include multicast authentication to prevent masquerade attacks within the network. However, unique constraints for these networks make most existing m...
Christopher Szilagyi, Philip Koopman
CODES
2010
IEEE
14 years 8 months ago
A task remapping technique for reliable multi-core embedded systems
With the continuous scaling of semiconductor technology, the life-time of circuit is decreasing so that processor failure becomes an important issue in MPSoC design. A software so...
Chanhee Lee, Hokeun Kim, Hae-woo Park, Sungchan Ki...
COMPSAC
2010
IEEE
14 years 8 months ago
Representing and Reasoning about Web Access Control Policies
The advent of emerging technologies such as Web services, service-oriented architecture, and cloud computing has enabled us to perform business services more efficiently and effect...
Gail-Joon Ahn, Hongxin Hu, Joohyung Lee, Yunsong M...
GLOBECOM
2010
IEEE
14 years 8 months ago
Space-Time Shift Keying: A Unified MIMO Architecture
In this paper, we propose a novel Space-Time Shift Keying (STSK) modulation scheme for MIMO communication systems, where the concept of spatial modulation is extended to include bo...
Shinya Sugiura, Sheng Chen, Lajos Hanzo
GLOBECOM
2010
IEEE
14 years 8 months ago
Online Network Coding for Time-Division Duplexing
We study an online random linear network coding approach for time division duplexing (TDD) channels under Poisson arrivals. We model the system as a bulk-service queue with variabl...
Daniel Enrique Lucani, Muriel Médard, Milic...
« Prev « First page 1503 / 1512 Last » Next »