Sciweavers

4330 search results - page 749 / 866
» Analyzing security architectures
Sort
View
DSN
2006
IEEE
15 years 9 months ago
Static Analysis to Enforce Safe Value Flow in Embedded Control Systems
Embedded control systems consist of multiple components with different criticality levels interacting with each other. For example, in a passenger jet, the navigation system inter...
Sumant Kowshik, Grigore Rosu, Lui Sha
GLOBECOM
2006
IEEE
15 years 9 months ago
Analysis of Peer-to-Peer SIP in a Distributed Mobile Middleware System
The seamless and flexible interconnection of the existing and emerging protocols and networks is essential to the success of the new generation mobile applications and services. Fo...
Erkki Harjula, Jussi Ala-Kurikka, Douglas Howie, M...
GLOBECOM
2006
IEEE
15 years 9 months ago
Analysis of the Effect of Mobile Terminal Speed on WLAN/3G Vertical Handovers
— WLAN hot-spots are becoming widely spread. This, combined with the availability of new multi-mode terminals integrating heterogeneous technologies, opens new business opportuni...
Telemaco Melia, Antonio de la Oliva, Ignacio Soto,...
ICAT
2006
IEEE
15 years 9 months ago
An Animation System for Imitation of Object Grasping in Virtual Reality
Interactive virtual characters are nowadays commonplace in games, animations, and Virtual Reality (VR) applications. However, relatively few work has so far considered the animatio...
Matthias Weber, Guido Heumer, Heni Ben Amor, Bernh...
ICDCSW
2006
IEEE
15 years 9 months ago
Wearable Computer for Ubiquitous Informal Communication
The rapid progress of information technology has spurred development of various communication support systems. In particular, the importance of informal communication has lately d...
Shun'ichi Tano, Tatsuhiro Takayama, Mitsuru Iwata,...