Sciweavers

9511 search results - page 71 / 1903
» Selected Design Issues
Sort
View
102
Voted
E2EMON
2006
IEEE
15 years 6 months ago
Active Probing Approach for Fault Localization in Computer Networks
—Active probing is an active network monitoring technique that has potential for developing effective solutions for fault localization. In this paper we use active probing to pre...
Maitreya Natu, Adarshpal S. Sethi
81
Voted
HT
2005
ACM
15 years 6 months ago
Vox populi: a tool for automatically generating video documentaries
Vox Populi is a system that automatically generates video documentaries. Our application domain is video interviews about controversial topics. Via a Web interface the user select...
Stefano Bocconi, Frank Nack, Lynda Hardman
94
Voted
ACMSE
2006
ACM
15 years 6 months ago
Security issues in privacy and key management protocols of IEEE 802.16
Without physical boundaries, a wireless network faces many more security threats than a wired network does. Therefore, in the IEEE 802.16 standard a security sublayer is specified...
Sen Xu, Manton M. Matthews, Chin-Tser Huang
102
Voted
CSEE
2000
Springer
15 years 5 months ago
Technology Transfer Issues for Formal Methods of Software Specification
Accurate and complete requirements specifications are crucial for the design and implementation of high-quality software. Unfortunately, the articulation and verification of softw...
Ken Abernethy, John C. Kelly, Ann E. Kelley Sobel,...
RTSS
2002
IEEE
15 years 5 months ago
Improving Quality-of-Control Using Flexible Timing Constraints: Metric and Scheduling Issues
Closed-loop control systems are dynamic systems subject to perturbations. One of the main concerns of the control is to design controllers to correct or limit the deviation that t...
Pau Martí, Josep M. Fuertes, Gerhard Fohler...