Sciweavers

483 search results - page 53 / 97
» A Method to Implement a Denial of Service Protection Base
Sort
View
151
Voted
SPIN
2007
Springer
15 years 9 months ago
Model Extraction for ARINC 653 Based Avionics Software
One of the most exciting and promising approaches to ensure the correctness of critical systems is software model checking, which considers real code, written with standard program...
Pedro de la Cámara, María-del-Mar Ga...
134
Voted
WIDM
2004
ACM
15 years 9 months ago
User evaluation of the NASA technical report server recommendation service
We present the user evaluation of two recommendation server methodologies implemented for the NASA Technical Report Server (NTRS). One methodology for generating recommendations u...
Michael L. Nelson, Johan Bollen, JoAnne R. Calhoun...
82
Voted
HICSS
1998
IEEE
120views Biometrics» more  HICSS 1998»
15 years 7 months ago
Load-Frequency Control Service in a Deregulated Environment
In a deregulated environment, independent generators and utility generators may or may not participate in the load-frequency control of the system. For the purpose of evaluating t...
A. P. Sakis Meliopoulos, George J. Cokkinides, A. ...
143
Voted
ECBS
2008
IEEE
113views Hardware» more  ECBS 2008»
15 years 3 months ago
Towards Secure Mobile Payment Based on SIP
Mobile payment has some unique advantages over more traditional payment methods in, for example, TV shopping and mobile multimedia services. Unfortunately, most existing mobile pa...
Ge Zhang, Feng Cheng 0002, Christoph Meinel
124
Voted
VTC
2007
IEEE
112views Communications» more  VTC 2007»
15 years 9 months ago
Unequal Importance Image Communication over Heterogeneous Networks
An unequal importance communication approach, for reliable and real-time image communication over heterogeneous networks and its applications in mobile communication systems is pre...
Mehdi Malboubi, Ahmad Bahai, Mustafa Ergen, Pravin...