Sciweavers

6147 search results - page 1209 / 1230
» Requirements, Architectures and Risks
Sort
View
CCR
2006
110views more  CCR 2006»
14 years 11 months ago
Estimating network proximity and latency
Network proximity and latency estimation is an important component in discovering and locating services and applications. With the growing number of services and service providers...
Puneet Sharma, Zhichen Xu, Sujata Banerjee, Sung-J...
CGF
2006
145views more  CGF 2006»
14 years 11 months ago
Classification of Illumination Methods for Mixed Reality
A mixed reality (MR) represents an environment composed both by real and virtual objects. MR applications are used more and more, for instance in surgery, architecture, cultural h...
Katrien Jacobs, Céline Loscos
DT
2006
180views more  DT 2006»
14 years 11 months ago
A SystemC Refinement Methodology for Embedded Software
process: Designers must define higher abstraction levels that allow system modeling. They must use description languages that handle both hardware and software components to descri...
Jérôme Chevalier, Maxime de Nanclas, ...
CN
2007
92views more  CN 2007»
14 years 11 months ago
A new approach to dynamic bandwidth allocation in Quality of Service networks: Performance and bounds
Efficient dynamic resource provisioning algorithms are necessary to the development and automation of Quality of Service (QoS) networks. The main goal of these algorithms is to oļ...
Jocelyne Elias, Fabio Martignon, Antonio Capone, G...
ISF
2008
114views more  ISF 2008»
14 years 11 months ago
An OVAL-based active vulnerability assessment system for enterprise computer networks
Abstract Many security problems are caused by vulnerabilities hidden in enterprise computer networks. It is very important for system administrators to have knowledge about the sec...
Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan
« Prev « First page 1209 / 1230 Last » Next »