Sciweavers

2516 search results - page 412 / 504
» Integrity Constraints for XML
Sort
View
EDOC
2007
IEEE
15 years 4 months ago
Incorporating Security Behaviour into Business Models Using a Model Driven Approach
There has, in recent years, been growing interest in Model Driven Engineering (MDE), in which models are the primary design artifacts and transformations are applied to these mode...
Peter F. Linington, Pulitha Liyanagama
GLVLSI
2007
IEEE
140views VLSI» more  GLVLSI 2007»
15 years 4 months ago
Structured and tuned array generation (STAG) for high-performance random logic
Regularly structured design techniques can combat complexity on a variety of fronts. We present the Structured and Tuned Array Generation (STAG) design methodology, which provides...
Matthew M. Ziegler, Gary S. Ditlow, Stephen V. Kos...
ICC
2007
IEEE
130views Communications» more  ICC 2007»
15 years 4 months ago
A Novel Key Redistribution Scheme for Wireless Sensor Networks
— Key management has long been a challenging problem in wireless Distributed Sensor Networks (DSNs) due to their high security requirements and strict resource constraints. Recen...
Chun-Fai Law, Ka-Shun Hung, Yu-Kwong Kwok
ICC
2007
IEEE
160views Communications» more  ICC 2007»
15 years 4 months ago
Opportunistic Cooperation for Quality of Service Provisionings Over Wireless Relay Networks
Abstract— We propose the QoS-driven opportunistic cooperation schemes for the wireless relay networks. By integrating information theory with the concept of effective capacity, o...
Lin Xie, Xi Zhang
ICC
2007
IEEE
146views Communications» more  ICC 2007»
15 years 4 months ago
A Delay-Constrained Shared Mesh Restoration Scheme
—We present a multi-constrained routing algorithm, called Delay-constrained Pool Sharing (DPS), in a survivable mesh network. The goal of this algorithm is to find a pair of link...
Hassan Naser, Ming Gong