Sciweavers

5799 search results - page 862 / 1160
» Position Paper
Sort
View
CAMAD
2006
IEEE
15 years 8 months ago
On the exploitation of user aggregation strategies in heterogeneous wireless networks
Abstract-- In this paper we discuss the exploitation of aggregated mobility patterns and physical proximity of nodes in a so-called ambient network, i.e., a wireless network with h...
Leonardo Badia, Nicola Bui, Marco Miozzo, Michele ...
DFT
2004
IEEE
118views VLSI» more  DFT 2004»
15 years 8 months ago
Defect Characterization for Scaling of QCA Devices
Quantum dot Cellular Automata (QCA) is amongst promising new computing scheme in the nano-scale regimes. As an emerging technology, QCA relies on radically different operations in...
Jing Huang, Mariam Momenzadeh, Mehdi Baradaran Tah...
CCS
2006
ACM
15 years 8 months ago
Defeasible security policy composition for web services
The ability to automatically compose security policies created by multiple organizations is fundamental to the development of scalable security systems. The diversity of policies ...
Adam J. Lee, Jodie P. Boyer, Lars E. Olson, Carl A...
CIARP
2006
Springer
15 years 8 months ago
Decoding of Ternary Error Correcting Output Codes
Error correcting output codes (ECOC) represent a successful extension of binary classifiers to address the multiclass problem. Lately, the ECOC framework was extended from the bina...
Sergio Escalera, Oriol Pujol, Petia Radeva
151
Voted
ECRTS
2004
IEEE
15 years 8 months ago
A New Sufficient Feasibility Test for Asynchronous Real-Time Periodic Task Sets
The problem of feasibility analysis for asynchronous periodic task sets (i.e. where tasks can have an initial offset) is known to be co-NP-complete in the strong sense. A sufficie...
Rodolfo Pellizzoni, Giuseppe Lipari