Sciweavers

2518 search results - page 480 / 504
» Using Communication Objects During Requirements Analysis
Sort
View
HICSS
2011
IEEE
210views Biometrics» more  HICSS 2011»
14 years 3 months ago
Different Paths to Broadband Access: The Impact of Governance and Policy on Broadband Diffusion in the Developed and Developing
A new digital divide is emerging both within and between nations that is due to inequalities in broadband Internet access. Our research examines the broadband digital divide by an...
David J. Yates, Girish J. Gulati, Joseph W. Weiss
DAC
2004
ACM
16 years 24 days ago
Heterogeneous MP-SoC: the solution to energy-efficient signal processing
To meet conflicting flexibility, performance and cost constraints of demanding signal processing applications, future designs in this domain will contain an increasing number of a...
Tim Kogel, Heinrich Meyr
MOBIHOC
2005
ACM
15 years 11 months ago
Toward resilient security in wireless sensor networks
Node compromise poses severe security threats in wireless sensor networks. Unfortunately, existing security designs can address only a small, fixed threshold number of compromised...
Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William A....
ICAS
2009
IEEE
168views Robotics» more  ICAS 2009»
15 years 6 months ago
Impact of Video Content on Video Quality for Video over Wireless Networks
—Video streaming is a promising multimedia application and is gaining popularity over wireless/mobile communications. The quality of the video depends heavily on the type of cont...
Asiya Khan, Lingfen Sun, Emmanuel C. Ifeachor
ISCC
2005
IEEE
107views Communications» more  ISCC 2005»
15 years 5 months ago
FTSE: The FNP-Like TCAM Searching Engine
As the Internet grows at a very rapid pace, so does the incidence of attack events and documented unlawful intrusions. The Network Intrusion Detection Systems (NIDSes) are designe...
Rong-Tai Liu, Chia-Nan Kao, Hung-Shen Wu, Ming-Cha...