Sciweavers

780 search results - page 109 / 156
» Correctness of Component-Based Adaptation
Sort
View
ISM
2008
IEEE
119views Multimedia» more  ISM 2008»
14 years 3 months ago
Evaluation of Error Resilience Mechanisms for 3G Conversational Video
Communication in 3G networks may experience packet losses due to transmission errors on the wireless link(s) which may severely impact the quality of conversational and streaming ...
Jegadish Devadoss, Varun Singh, Jörg Ott, Che...
SADFE
2008
IEEE
14 years 3 months ago
Finding the Evidence in Tamper-Evident Logs
Secure logs are powerful tools for building systems that must resist forgery, prove temporal relationships, and stand up to forensic scrutiny. The proofs of order and integrity en...
Daniel Sandler, Kyle Derr, Scott A. Crosby, Dan S....
SASO
2008
IEEE
14 years 3 months ago
A Framework for Self-Protecting Cryptographic Key Management
Demands to match security with performance in Web applications where access to shared data needs to be controlled dynamically make self-protecting security schemes attractive. Yet...
Anne V. D. M. Kayem, Patrick Martin, Selim G. Akl,...
CEC
2007
IEEE
14 years 3 months ago
A fractal representation for real optimization
— The chaos game, in which a moving point is repeatedly averaged toward randomly selected vertices of a triangle, is one method of generating the fractal called the Sierpinski tr...
Daniel A. Ashlock, Justin Schonfeld
GLOBECOM
2007
IEEE
14 years 3 months ago
The Design and Evaluation of a Wireless Sensor Network for Mine Safety Monitoring
– This paper describes a wireless sensor network for mine safety monitoring. Based on the characteristics of underground mine gallery and the requirements for mine safety monitor...
Xiaoguang Niu, Xi Huang, Ze Zhao, Yuhe Zhang, Chan...