Sciweavers

10038 search results - page 1843 / 2008
» Model Checking for Managers
Sort
View
NLUCS
2008
15 years 5 months ago
Ontology-driven Vaccination Information Extraction
Increasingly, medical institutions have access to clinical information through computers. The need to process and manage the large amount of data is motivating the recent interest ...
Liliana Ferreira, António Teixeira, Jo&atil...
MASCOTS
2007
15 years 5 months ago
A Novel Flow Control Scheme for Best Effort Traffic in NoC Based on Source Rate Utility Maximization
—Advances in semiconductor technology, has enabled designers to put complex, massively parallel multiprocessor systems on a single chip. Network on Chip (NoC) that supports high ...
Mohammad Sadegh Talebi, Fahimeh Jafari, Ahmad Khon...
MOBIMEDIA
2007
15 years 5 months ago
AAA and mobile networks: security aspects and architectural efficiency
Security is a crucial factor in the provision of the network services, in both wireless and wired communications. Day by day, the number of subscribers is increased by an exponent...
Nicolas Sklavos, Spyros G. Denazis, Odysseas G. Ko...
SERVICES
2008
106views more  SERVICES 2008»
15 years 5 months ago
Distributed Simulation and Web Map Mash-Up for Forest Fire Spread
The emergence of recent XML-based technologies paved the way for new types of architectures and message exchanges on the Internet through Web services. MashUps consist in combinin...
Yosri Harzallah, Vincent Michel, Qi Liu, Gabriel A...
WICON
2008
15 years 5 months ago
Denial of service vulnerabilities in the 802.16 protocol
This paper examines the denial of service attacks that an 802.16 Broadband Wireless Access network is susceptible to at the physical and medium access control layers. In our threa...
Siddharth Maru, Timothy X. Brown
« Prev « First page 1843 / 2008 Last » Next »