Sciweavers

3717 search results - page 482 / 744
» Architecture-Based Design of Computer Based Systems
Sort
View
CCS
2008
ACM
14 years 23 days ago
Revocation games in ephemeral networks
A frequently proposed solution to node misbehavior in mobile ad hoc networks is to use reputation systems. But in ephemeral networks - a new breed of mobile networks where contact...
Maxim Raya, Mohammad Hossein Manshaei, Márk...
MOBIHOC
2006
ACM
14 years 10 months ago
Adaptive splitting protocols for RFID tag collision arbitration
Tag identification is an important tool in RFID systems with applications for monitoring and tracking. A RFID reader recognizes tags through communication over a shared wireless c...
Jihoon Myung, Wonjun Lee
DSN
2002
IEEE
14 years 3 months ago
Performability Analysis of Guarded-Operation Duration: A Successive Model-Translation Approach
When making an engineering design decision, it is often necessary to consider its implications on both system performance and dependability. In this paper, we present a performabi...
Ann T. Tai, William H. Sanders, Leon Alkalai, Savi...
CASSIS
2004
Springer
14 years 2 months ago
Verification of Safety Properties in the Presence of Transactions
The JAVA CARD transaction mechanism can ensure that a sequence of statements either is executed to completion or is not executed at all. Transactions make verification of JAVA CARD...
Reiner Hähnle, Wojciech Mostowski
DAC
2003
ACM
14 years 11 months ago
Energy-aware MPEG-4 FGS streaming
-- In this paper, we propose an energy-aware MPEG-4 FGS video streaming system with client feedback. In this client-server system, the battery-powered mobile client sends its maxim...
Kihwan Choi, Kwanho Kim, Massoud Pedram