Sciweavers

2813 search results - page 510 / 563
» Design and Use of Technology Enhanced Learning Environments
Sort
View
RTSS
1997
IEEE
15 years 1 months ago
On adaptive resource allocation for complex real-time application
Resource allocation for high-performance real-time applications is challenging due to the applications' data-dependent nature, dynamic changes in their external environment, ...
Daniela Rosu, Karsten Schwan, Sudhakar Yalamanchil...
CARDIS
2008
Springer
113views Hardware» more  CARDIS 2008»
14 years 11 months ago
The Trusted Execution Module: Commodity General-Purpose Trusted Computing
This paper introduces the Trusted Execution Module (TEM); a high-level specification for a commodity chip that can execute usersupplied procedures in a trusted environment. The TEM...
Victor Costan, Luis F. G. Sarmenta, Marten van Dij...
WICON
2008
14 years 11 months ago
Constructing accurate, space-efficient, wireless coverage maps for vehicular contexts
Wireless connectivity for vehicles is a fast-growing market, with a plethora of different network technologies already in use. Surveys of the numbers of IEEE 802.11b/g access poin...
David N. Cottingham, Robert K. Harle, Andy Hopper
JNW
2006
186views more  JNW 2006»
14 years 9 months ago
Developing Network Domain Security (NDS) Model for IP Multimedia Subsystem (IMS)
In this research article we discuss the protocols, architecture and propose the design of Network Domain Security (NDS) model for IP Multimedia Subsystem (IMS). The IMS is standard...
Muhammad Sher, Thomas Magedanz
ECRA
2007
140views more  ECRA 2007»
14 years 9 months ago
Strategies in supply chain management for the Trading Agent Competition
Negotiating with suppliers and with customers is a key part of supply chain management. However, with recent technological advances, the mechanisms available to carry out such act...
Yain-Whar Si, David Edmond, Marlon Dumas, Chan U. ...