Sciweavers

1078 search results - page 146 / 216
» Modelling and Verifying of e-Commerce Systems
Sort
View
TON
2010
127views more  TON 2010»
14 years 11 months ago
Queue Dynamics With Window Flow Control
This paper develops a new model that describes the queueing process of a communication network when data sources use window flow control. The model takes into account the burstines...
Ao Tang, Lachlan L. H. Andrew, Krister Jacobsson, ...
CRV
2008
IEEE
192views Robotics» more  CRV 2008»
15 years 11 months ago
Realtime Visualization of Monocular Data for 3D Reconstruction
Methods for reconstructing photorealistic 3D graphics models from images or video are appealing applications of computer vision. Such methods rely on good input image data, but th...
Adam Rachmielowski, Neil Birkbeck, Martin Jäg...
HICSS
2008
IEEE
165views Biometrics» more  HICSS 2008»
15 years 11 months ago
Can a P2P File-Sharing Network Become an e-Marketplace?
The prevalence of P2P technology contributes the ease of file-sharing, but it also brings some problems such as free-riding and copyright infringement. To solve these problems, ma...
Fu-ren Lin, Hau-ming Lo, Cong-ren Wang
RE
2001
Springer
15 years 9 months ago
Events and Constraints: A Graphical Editor for Capturing Logic Requirements of Programs
A logic model checker can be an effective tool for debugging software applications. A stumbling block can be that model checking tools expect the user to supply a formal statement...
Margaret H. Smith, Gerard J. Holzmann, Kousha Etes...
ACSAC
2007
IEEE
15 years 11 months ago
Establishing and Sustaining System Integrity via Root of Trust Installation
Integrity measurements provide a means by which distributed systems can assess the trustability of potentially compromised remote hosts. However, current measurement techniques si...
Luke St. Clair, Joshua Schiffman, Trent Jaeger, Pa...