Sciweavers

4330 search results - page 740 / 866
» Analyzing security architectures
Sort
View
134
Voted
GLVLSI
2009
IEEE
154views VLSI» more  GLVLSI 2009»
15 years 10 months ago
Design of a maximum-likelihood detector for cooperative communications in intersymbol interference channels
Recently, cooperative communication has attracted a lot of attention for its potential to increase spatial diversity. However, limited attention has been paid to the physical laye...
Yanjie Peng, Andrew G. Klein, Xinming Huang
ICAC
2009
IEEE
15 years 10 months ago
Applying adaptation design patterns
Dynamic adaptation may be used to prevent software downtime while new requirements and responses to environmental conditions are incorporated into the system. Previously, we studi...
Andres J. Ramirez, Betty H. C. Cheng
ICAS
2009
IEEE
138views Robotics» more  ICAS 2009»
15 years 10 months ago
An Assessment of Self-Managed P2P Streaming
Peer-to-Peer (P2P) IPTV applications have increasingly been considered as a potential approach to online broadcasting. These overcome fundamental client-server issues and introduc...
Majed Alhaisoni, Antonio Liotta, Mohammed Ghanbari
105
Voted
ICC
2009
IEEE
128views Communications» more  ICC 2009»
15 years 10 months ago
Approximate Flow-Aware Networking
—A new variation of the Flow-Aware Networking (FAN) concept is presented in the paper. The proposed solution is based on the Approximate Fair Dropping algorithm and called by us ...
Jerzy Domzal, Andrzej Jajszczyk
WCRE
2009
IEEE
15 years 10 months ago
NTrace: Function Boundary Tracing for Windows on IA-32
—For a long time, dynamic tracing has been an enabling technique for reverse engineering tools. Tracing can not only be used to record the control flow of a particular component...
Johannes Passing, Alexander Schmidt, Martin von L&...