Sciweavers

131 search results - page 20 / 27
» Controller Architecture for Safe Cognitive Technical Systems
Sort
View
IWCMC
2006
ACM
15 years 3 months ago
Load balancing in the call admission control of heterogeneous wireless networks
In the next generation wireless systems (NGWS) the end user will be able to connect to any of the different available access networks. The end user will also be able to roam seaml...
Kamil H. Suleiman, H. Anthony Chan, Mqhele E. Dlod...
88
Voted
MMS
2010
14 years 8 months ago
Asynchronous reflections: theory and practice in the design of multimedia mirror systems
-- In this paper, we present a theoretical framing of the functions of a mirror by breaking the synchrony between the state of a reference object and its reflection. This framing p...
Wei Zhang, Bo Begole, Maurice Chu
ACSAC
2006
IEEE
15 years 3 months ago
A Module System for Isolating Untrusted Software Extensions
With the recent advent of dynamically extensible software systems, in which software extensions may be dynamically loaded into the address space of a core application to augment i...
Philip W. L. Fong, Simon A. Orr
ICETE
2004
253views Business» more  ICETE 2004»
14 years 11 months ago
BLAZE: A Mobile Agent Paradigm for VoIP Intrusion Detection Systems
ser provides abstraction for supporting flexible security policies that can be developed using the low-level primitives of the browser. We believe our browser architecture will be ...
Kapil Singh, Son T. Vuong
RTSS
2003
IEEE
15 years 2 months ago
Data Caches in Multitasking Hard Real-Time Systems
Data caches are essential in modern processors, bridging the widening gap between main memory and processor speeds. However, they yield very complex performance models, which make...
Xavier Vera, Björn Lisper, Jingling Xue