Sciweavers

14190 search results - page 2528 / 2838
» computing 2008
Sort
View
CODES
2008
IEEE
15 years 11 months ago
A security monitoring service for NoCs
As computing and communications increasingly pervade our lives, security and protection of sensitive data and systems are emerging as extremely important issues. Networks-onChip (...
Leandro Fiorin, Gianluca Palermo, Cristina Silvano
CODES
2008
IEEE
15 years 11 months ago
Symbolic voter placement for dependability-aware system synthesis
This paper presents a system synthesis approach for dependable embedded systems. The proposed approach significantly extends previous work by automatically inserting fault detect...
Felix Reimann, Michael Glabeta, Martin Lukasiewycz...
COMPSAC
2008
IEEE
15 years 11 months ago
Error Modeling in Dependable Component-Based Systems
Component-Based Development (CBD) of software, with its successes in enterprise computing, has the promise of being a good development model due to its cost effectiveness and pote...
Hüseyin Aysan, Sasikumar Punnekkat, Radu Dobr...
COMSWARE
2008
IEEE
15 years 11 months ago
Quantifying presence using calling patterns
—Presence technology is going to be an integral part of the next generation of communication technology. It can eliminate telephone tag between two parties (caller and callee), w...
Husain Husna, Santi Phithakkitnukoon, Enkh-Amgalan...
COMSWARE
2008
IEEE
15 years 11 months ago
On TCP-aware uplink scheduling in IEEE 802.16 networks
Abstract—In this paper we propose two polling based scheduling schemes for applications based on TCP in a multipointto-point IEEE 802.16 network. The first scheme uses TCP conge...
Hemant Kumar Rath, Abhay Karandikar
« Prev « First page 2528 / 2838 Last » Next »