Sciweavers

121 search results - page 16 / 25
» Data Assurance in Opaque Computations
Sort
View
IPPS
1998
IEEE
15 years 3 months ago
The Effect of the Router Arbitration Policy on the Scalability of ServerNet
In this paper we extend a previously introduced method for optimizing the arbitration policy employed by ServerNet routers and we evaluate the method's effect on scalability....
Vladimir Shurbanov, Dimiter R. Avresky, Robert W. ...
113
Voted
ICNSC
2008
IEEE
15 years 6 months ago
Cscan: A Correlation-based Scheduling Algorithm for Wireless Sensor Networks
— Dynamic scheduling management in wireless sensor networks is one of the most challenging problems in long lifetime monitoring applications. In this paper, we propose and evalua...
Qingquan Zhang, Yu Gu, Tian He, Gerald E. Sobelman
75
Voted
GI
2005
Springer
15 years 5 months ago
IQ Principles in Software Development
: This is an ongoing project, which is scheduled until 2005. So I decided together with Richard Wang to set up Sup-Projects that could be published earlier. The main objective is t...
Michael Mielke
ADC
2009
Springer
175views Database» more  ADC 2009»
15 years 6 months ago
Conditional Purpose Based Access Control Model for Privacy Protection
This paper presents a model for privacy preserving access control which is based on variety of purposes. Conditional purpose is applied along with allowed purpose and prohibited p...
Md. Enamul Kabir, Hua Wang
GLVLSI
2007
IEEE
141views VLSI» more  GLVLSI 2007»
15 years 3 months ago
A synchronization algorithm for local temporal refinements in perfectly synchronous models with nested feedback loops
he abstract and simple computation and communication mechanism in the synchronous computational model it is easy to simulate synchronous systems and to apply formal verification m...
Tarvo Raudvere, Ingo Sander, Axel Jantsch