Sciweavers

6978 search results - page 1269 / 1396
» Reframing Requirements Analysis
Sort
View
DATE
2009
IEEE
116views Hardware» more  DATE 2009»
15 years 4 months ago
An MDE methodology for the development of high-integrity real-time systems
—This paper reports on experience gained and lessons learned from an intensive investigation of model-driven engineering methodology and technology for application to high-integr...
Silvia Mazzini, Stefano Puri, Tullio Vardanega
GLOBECOM
2009
IEEE
15 years 4 months ago
Lightweight Jammer Localization in Wireless Networks: System Design and Implementation
—Jamming attacks have become prevalent during the last few years, due to the shared nature and the open access to the wireless medium. Finding the location of a jamming device is...
Konstantinos Pelechrinis, Iordanis Koutsopoulos, I...
GLOBECOM
2009
IEEE
15 years 4 months ago
Reusable Set Constructions Using Randomized Dissolvent Templates for Biometric Security
—The emerging biometric cryptography has gained significant interests for key management and privacy protection, but the previously proposed schemes using set metrics for finge...
Jinyang Shi, Kwok-Yan Lam, Ming Gu, Husheng Li
HPDC
2009
IEEE
15 years 4 months ago
Resource co-allocation for large-scale distributed environments
Advances in the development of large scale distributed computing systems such as Grids and Computing Clouds have intensified the need for developing scheduling algorithms capable...
Claris Castillo, George N. Rouskas, Khaled Harfous...
ICAS
2009
IEEE
168views Robotics» more  ICAS 2009»
15 years 4 months ago
Impact of Video Content on Video Quality for Video over Wireless Networks
—Video streaming is a promising multimedia application and is gaining popularity over wireless/mobile communications. The quality of the video depends heavily on the type of cont...
Asiya Khan, Lingfen Sun, Emmanuel C. Ifeachor
« Prev « First page 1269 / 1396 Last » Next »