Sciweavers

8636 search results - page 1443 / 1728
» How Developers Copy
Sort
View
IJCCBS
2010
105views more  IJCCBS 2010»
15 years 2 months ago
Software safety: relating software assurance and software integrity
: The overall safety integrity of a safety critical system, comprising both software and hardware, is typically specified quantitatively, e.g., in terms of failure rates. However, ...
Ibrahim Habli, Richard Hawkins, Tim Kelly
INFOCOM
2010
IEEE
15 years 2 months ago
A Balanced Consistency Maintenance Protocol for Structured P2P Systems
—A fundamental challenge of managing mutable data replication in a Peer-to-Peer (P2P) system is how to efficiently maintain consistency under various sharing patterns with heter...
Yi Hu, Min Feng, Laxmi N. Bhuyan
141
Voted
INFOCOM
2010
IEEE
15 years 2 months ago
Joint Random Access and Power Selection for Maximal Throughput in Wireless Networks
—In wireless networks, how to select transmit power that maximizes throughput is a challenging problem. On one hand, transmissions at a high power level could increase interferen...
Yan Gao, Zheng Zeng, P. R. Kumar
INFORMS
2010
145views more  INFORMS 2010»
15 years 2 months ago
An Automated Intensity-Modulated Radiation Therapy Planning System
We design and implement an intensity-modulated radiation therapy (IMRT) plan generation technology that effectively and efficiently optimizes beam geometry as well as beam intens...
Shabbir Ahmed, Ozan Gozbasi, Martin W. P. Savelsbe...
IPMU
2010
Springer
15 years 2 months ago
See-Through Vision: A Visual Augmentation Method for Sensing-Web
Abstract. Many surveillance cameras are being installed throughout the environments of our daily lives because they effectively maintain safety and offer security to ordinary peopl...
Yuichi Ohta, Yoshinari Kameda, Itaru Kitahara, Mas...
« Prev « First page 1443 / 1728 Last » Next »