Sciweavers

1424 search results - page 202 / 285
» Experiences on Designing an Integral Intrusion Detection Sys...
Sort
View
INFSOF
2008
83views more  INFSOF 2008»
15 years 1 months ago
A framework for ensuring consistency of Web Services Transactions
For efficiently managing Web Services (WS) transactions which are executed across multiple loosely-coupled autonomous organizations, isolation is commonly relaxed. A Web service o...
Seunglak Choi, Hangkyu Kim, Hyukjae Jang, Jungsook...
VLSID
2008
IEEE
138views VLSI» more  VLSID 2008»
16 years 1 months ago
Memory Architecture Exploration Framework for Cache Based Embedded SOC
Today's feature-rich multimedia products require embedded system solution with complex System-on-Chip (SoC) to meet market expectations of high performance at a low cost and l...
T. S. Rajesh Kumar, C. P. Ravikumar, R. Govindaraj...
BCSHCI
2007
15 years 2 months ago
GazeSpace: eye gaze controlled content spaces
In this paper, we introduce GazeSpace, a novel system utilizing eye gaze to browse content spaces. While most existing eye gaze systems are designed for medical contexts, GazeSpac...
Sven Laqua, Shane Udaraka Bandara, Martina Angela ...
TELSYS
2008
99views more  TELSYS 2008»
15 years 1 months ago
Mote-based underwater sensor networks: opportunities, challenges, and guidelines
Most underwater networks rely on expensive specialized hardware for acoustic communication and modulation. This has impeded wide scale deployments of underwater sensor networks and...
Raja Jurdak, Antonio G. Ruzzelli, Gregory M. P. O'...
ISVLSI
2007
IEEE
131views VLSI» more  ISVLSI 2007»
15 years 7 months ago
Improving the Quality of Bounded Model Checking by Means of Coverage Estimation
Formal verification has become an important step in circuit and system design. A prominent technique is Bounded Model Checking (BMC) which is widely used in industry. In BMC it i...
Ulrich Kühne, Daniel Große, Rolf Drechs...