Sciweavers

1115 search results - page 90 / 223
» An Abstract Look at Realizability
Sort
View
AICT
2009
IEEE
164views Communications» more  AICT 2009»
14 years 4 months ago
A Method of Admission Control Based on Both Resource Requests and Traffic Measurement and Its Dynamics under On/Off Model Traffi
Abstract: A method of admission control based on both resource requests by applications and class-based traffic measurement results was developed. In this method, a wide range of a...
Yasusi Kanada
PERCOM
2009
ACM
14 years 4 months ago
Privacy-Preserving Event Detection in Pervasive Spaces
Abstract—In this paper, we consider privacy challenges in eventdriven pervasive spaces where multimedia streams captured by sensors embedded in the infrastructure are used to det...
Bijit Hore, Jehan Wickramasuriya, Sharad Mehrotra,...
CSFW
2009
IEEE
14 years 4 months ago
Universally Composable Symmetric Encryption
For most basic cryptographic tasks, such as public key encryption, digital signatures, authentication, key exchange, and many other more sophisticated tasks, ideal functionalities...
Ralf Küsters, Max Tuengerthal
ICC
2009
IEEE
161views Communications» more  ICC 2009»
14 years 4 months ago
Downlink OFDMA Resource Allocation Under Partial Channel State Information
Abstract— The problem of resource allocation (RA) in a downlink OFDMA system is examined under the realistic assumption of imperfect channel state information (CSI) at the base s...
Stelios Stefanatos, Nikos Dimitriou
SEUS
2009
IEEE
14 years 4 months ago
Fine-Grained Tailoring of Component Behaviour for Embedded Systems
Abstract. The application of run-time reconfigurable component models to networked embedded systems has a number of significant advantages such as encouraging software reuse, ada...
Nelson Matthys, Danny Hughes, Sam Michiels, Christ...