Sciweavers

15635 search results - page 2721 / 3127
» A Designing Model of XML-Dataweb
Sort
View
GLOBECOM
2009
IEEE
15 years 8 months ago
Dual-Hop Adaptive Packet Transmission with Regenerative Relaying for Wireless TDD Systems
We consider the design and performance analysis of adaptive modulation and coding (AMC) applied to regenerative dual-hop transmission systems, where a source node communicates with...
Andreas Muller, Hong-Chuan Yang
144
Voted
ICECCS
2007
IEEE
120views Hardware» more  ICECCS 2007»
15 years 8 months ago
Verifying the CICS File Control API with Z/Eves: An Experiment in the Verified Software Repository
Parts of the CICS transaction processing system were modelled formally in the 1980s in a collaborative project between IBM Hursley Park and Oxford University Computing Laboratory....
Leo Freitas, Konstantinos Mokos, Jim Woodcock
ACNS
2004
Springer
133views Cryptology» more  ACNS 2004»
15 years 8 months ago
Limited Verifier Signature from Bilinear Pairings
Motivated by the conflict between authenticity and privacy in the digital signature, the notion of limited verifier signature was introduced [1]. The signature can be verified by a...
Xiaofeng Chen, Fangguo Zhang, Kwangjo Kim
ACSAC
2004
IEEE
15 years 8 months ago
The Trustworthy Computing Security Development Lifecycle
This paper discusses the Trustworthy Computing Security Development Lifecycle (or simply the SDL), a process that Microsoft has adopted for the development of software that needs ...
Steven B. Lipner
ACSC
2004
IEEE
15 years 8 months ago
Adaptive Cooperative Fuzzy Logic Controller
Fuzzy logic is a natural basis for modelling and solving problems involving imprecise knowledge and continuous systems. Unfortunately, fuzzy logic systems are invariably static (o...
Justin Ammerlaan, David Wright
« Prev « First page 2721 / 3127 Last » Next »