Sciweavers

1010 search results - page 156 / 202
» Designing Then and Now
Sort
View
MSWIM
2006
ACM
15 years 5 months ago
Testing methodology for an ad hoc routing protocol
In this paper, we define a model of an ad hoc routing protocol, i.e. the OLSR (Optimized Link-State Routing) protocol. This model handles novel constraints related to such networ...
Stéphane Maag, Fatiha Zaïdi
EEE
2005
IEEE
15 years 4 months ago
From Multi-Context Business Collaboration Models to Context-Specific ebXML BPSS
UN/CEFACT’s Modelling Methodology (UMM) is used to analyze and design B2B business processes. We extend UMM by a constraint mechanism for adding business environment-specific co...
Birgit Hofreiter, Christian Huemer
ISCA
2005
IEEE
128views Hardware» more  ISCA 2005»
15 years 4 months ago
An Evaluation Framework and Instruction Set Architecture for Ion-Trap Based Quantum Micro-Architectures
: The theoretical study of quantum computation has yielded efficient algorithms for some traditionally hard problems. Correspondingly, experimental work on the underlying physical...
Steven Balensiefer, Lucas Kreger-Stickles, Mark Os...
COOPIS
2003
IEEE
15 years 4 months ago
Providing a Progressive Access to Awareness Information
Awareness has now become a widely accepted central feature in groupware systems. In this context, providing an awareness support consists in delivering to users involved in a colla...
Manuele Kirsch-Pinheiro, Marlène Villanova-...
HICSS
2003
IEEE
151views Biometrics» more  HICSS 2003»
15 years 4 months ago
A Simple GSPN for Modeling Common Mode Failures in Critical Infrastructures
It is now apparent that our nation’s infrastructures and essential utilities have been optimized for reliability in benign operating environments. As such, they are susceptible ...
Axel W. Krings, Paul W. Oman