Sciweavers

4330 search results - page 751 / 866
» Analyzing security architectures
Sort
View
232
Voted
LAWEB
2006
IEEE
15 years 9 months ago
Modeling and Composing Navigational Concerns in Web Applications. Requirements and Design Issues
Complex applications, in particular Web applications, deal with a myriad of different concerns and some of them affect several others. The result is that these crosscutting concer...
Silvia E. Gordillo, Gustavo Rossi, Ana Moreira, Jo...
113
Voted
QEST
2006
IEEE
15 years 9 months ago
Modeling Fiber Delay Loops in an All Optical Switch
We analyze the effect of a few fiber delay loops on the number of deflections in an all optical packet switch. The switch is based on the ROMEO architecture developed by Alcatel...
Ana Busic, Mouad Ben Mamoun, Jean-Michel Fourneau
128
Voted
SAINT
2006
IEEE
15 years 9 months ago
A Pervasive Internet Approach to Fine-Grain Power-Aware Computing
We present a novel approach to conserve power in networked mobile devices. Our approach exploits communication within a pervasive smart space as an opportunity to save power as op...
Ahmed Abukmail, Abdelsalam Helal
150
Voted
VTC
2006
IEEE
114views Communications» more  VTC 2006»
15 years 9 months ago
Channel Capacity of BLAST based on the Zero-Forcing criterion
In this paper, we present an asymptotical analysis of channel capacity of Bell labs layered space-time (BLAST) architectures based on a zero-forcing (ZF) criterion in the sense of...
Heunchul Lee, Inkyu Lee
111
Voted
MOBICOM
2006
ACM
15 years 9 months ago
Fast and reliable estimation schemes in RFID systems
RFID tags are being used in many diverse applications in increasingly large numbers. These capabilities of these tags span from very dumb passive tags to smart active tags, with t...
Murali S. Kodialam, Thyaga Nandagopal