Sciweavers

2211 search results - page 344 / 443
» Comparing Approaches to Implement Feature Model Composition
Sort
View
ACSAC
2000
IEEE
14 years 1 months ago
Secure Compartmented Data Access over an Untrusted Network using a COTS-based Architecture
In this paper, we present an approach to secure compartmented data access over an untrusted network using a secure network computing architecture. We describe the architecture and...
P. C. Clark, M. C. Meissner, K. O. Vance
IJRFITA
2007
114views more  IJRFITA 2007»
13 years 8 months ago
Semi-passive RFID and beyond: steps towards automated quality tracing in the food chain
: Precise temperature monitoring is the major precondition to supervise quality losses within the transport chain for fresh products. Different types of miniaturised data loggers w...
Reiner Jedermann, Walter Lang
ICC
2009
IEEE
13 years 6 months ago
Opportunities, Constraints, and Benefits of Relaying in the Presence of Interference
In this paper the interference channel is extended by additional relay nodes in order to investigate the influence of interference on the design and performance of relaying protoco...
Peter Rost, Gerhard Fettweis, J. Nicholas Laneman
EPIA
2009
Springer
14 years 22 days ago
Item-Based and User-Based Incremental Collaborative Filtering for Web Recommendations
Abstract. In this paper we propose an incremental item-based collaborative filtering algorithm. It works with binary ratings (sometimes also called implicit ratings), as it is typi...
Catarina Miranda, Alípio Mário Jorge
CASES
2009
ACM
14 years 3 months ago
Tight WCRT analysis of synchronous C programs
Accurate estimation of the tick length of a synchronous program is essential for efficient and predictable implementations that are devoid of timing faults. The techniques to dete...
Partha S. Roop, Sidharta Andalam, Reinhard von Han...