Sciweavers

4330 search results - page 782 / 866
» Analyzing security architectures
Sort
View
111
Voted
PPL
2007
112views more  PPL 2007»
15 years 3 months ago
Embodied Computation
The traditional computational devices and models, such as the von Neumann architecture or the Turing machine, are strongly influenced by concepts of central control and perfectio...
Heiko Hamann, Heinz Wörn
IAJIT
2010
115views more  IAJIT 2010»
15 years 2 months ago
Measurement of V2oIP over wide area network between countries using soft phone and USB phone
: In this research, we propose an architectural solution to integrate the video voice over IP services in campus environment network and tested over LAN and WAN. Voice over IP tech...
Mohd Ismail
125
Voted
JSA
2010
101views more  JSA 2010»
15 years 2 months ago
Experimental evaluation of slack management in real-time control systems: Coordinated vs. self-triggered approach
Effective slack management, i.e. management of unused computing resources, for real-time control tasks mandates to redistribute the available resources between controllers as a f...
Manel Velasco, Pau Martí, Josep M. Fuertes,...
113
Voted
JUCS
2010
139views more  JUCS 2010»
15 years 2 months ago
Gabor Filter Aided 3D Ultra-Sonography Diagnosis System with WLAN Transmission Consideration
: The Gabor filter aided diagnosis system for 3-dimensional ultra-sonography (3DUS) under the WLAN environment is introduced. Due to the important relationship between breast tumou...
Wei-Ming Chen, Chi-Hsiang Lo, Han-Chieh Chao, Chun...
149
Voted
MASCOTS
2010
15 years 2 months ago
Black-Box Performance Modeling for Solid-State Drives
—Flash-based Solid-State Drives (SSDs) have become a promising alternative to magnetic Hard Disk Drives (HDDs) thanks to the large improvements in performance, power consumption,...
Shan Li, H. Howie Huang