Sciweavers

1411 search results - page 230 / 283
» Case Studies of an Insider Framework
Sort
View
DATE
2006
IEEE
82views Hardware» more  DATE 2006»
14 years 2 months ago
Performance analysis of greedy shapers in real-time systems
— Traffic shaping is a well-known technique in the area of networking and is proven to reduce global buffer requirements and end-to-end delays in networked systems. Due to these...
Ernesto Wandeler, Alexander Maxiaguine, Lothar Thi...
ECBS
2006
IEEE
112views Hardware» more  ECBS 2006»
14 years 2 months ago
A Goal-Oriented Approach for Safety Requirements Specification
Robotic systems are developed to execute tasks with several types of risks associated. The possible damages that can affect both the working environment and the self-system lead u...
Elena Navarro, Pedro Sánchez, Patricio Lete...
VTC
2006
IEEE
171views Communications» more  VTC 2006»
14 years 2 months ago
An Analysis on Uplink OFDMA Optimality
Motivated by the increasing popularity of OFDMA, this paper studies the sum-rate optimality of OFDMA as an uplink multicarrier multiple-access scheme. We address the relationship ...
Hongxiang Li, Hui Liu
DOLAP
2006
ACM
14 years 2 months ago
Designing what-if analysis: towards a methodology
In order to be able to evaluate beforehand the impact of a strategical or tactical move, decision makers need reliable previsional systems. What-if analysis satisfies this need b...
Matteo Golfarelli, Stefano Rizzi, Andrea Proli
NSPW
2006
ACM
14 years 2 months ago
Sanitization models and their limitations
This work explores issues of computational disclosure control. We examine assumptions in the foundations of traditional problem statements and abstract models. We offer a comprehe...
Rick Crawford, Matt Bishop, Bhume Bhumiratana, Lis...