Sciweavers

5107 search results - page 882 / 1022
» Design Issue Of ECTST
Sort
View
AO
2006
97views more  AO 2006»
14 years 10 months ago
An ontological model of device function: industrial deployment and lessons learned
Functionality is one of the key concepts of knowledge about artifacts. Functional knowledge shows a part of designer's intention (so-called design rationale), and thus its sha...
Yoshinobu Kitamura, Yusuke Koji, Riichiro Mizoguch...
DEBU
2006
166views more  DEBU 2006»
14 years 10 months ago
Oracle's Self-Tuning Architecture and Solutions
Performance tuning in modern database systems requires a lot of expertise, is very time consuming and often misdirected. Tuning attempts often lack a methodology that has a holist...
Benoît Dageville, Karl Dias
ISCI
2008
86views more  ISCI 2008»
14 years 10 months ago
New (t, n) threshold directed signature scheme with provable security
Directed signature scheme allows only a designated verifier to check the validity of the signature issued to him; and at the time of trouble or if necessary, any third party can v...
Rongxing Lu, Xiaodong Lin, Zhenfu Cao, Jun Shao, X...
JCM
2008
70views more  JCM 2008»
14 years 10 months ago
Reed-Solomon Codes for Low Power Communications
Power consumption is a critical issue for many applications running on autonomous battery operated devices. In the context of low power communications, the use of Forward Error Cor...
Lionel Biard, Dominique Noguet
JCM
2008
134views more  JCM 2008»
14 years 10 months ago
Cover-Free Family based Efficient Group Key Management Strategy in Wireless Sensor Network
Abstract-- Secure group key distribution and efficient rekeying is one of the most challenging security issues in sensor networks at present. In this paper, Latin square is firstly...
Li Xu, Jianwei Chen, Xiaoding Wang