Sciweavers

1527 search results - page 84 / 306
» Demographic information flows
Sort
View
TMC
2008
179views more  TMC 2008»
15 years 4 months ago
Active Queue Management for Fair Resource Allocation in Wireless Networks
This paper investigates the interaction between end-to-end flow control and medium access control (MAC)-layer scheduling on wireless links. We consider a wireless network with mult...
Lachlan L. H. Andrew, Stephen V. Hanly, Rami G. Mu...
ICIP
1998
IEEE
16 years 5 months ago
A Combinatorical Approach to Vector Tomography for Doppler Spectral Data
Velocity spectra of a flow can be made by ultrasound Doppler measurements. Using only part of the information in these spectra, it is possible to reconstruct the solenoid part and...
Kent Stråhlén
DAWAK
2009
Springer
15 years 8 months ago
Visual Modelling of Data Warehousing Flows with UML Profiles
Data warehousing involves complex processes that transform source data through several stages to deliver suitable information ready to be analysed. Though many techniques for visua...
Jesús Pardillo, Matteo Golfarelli, Stefano ...
CSFW
2007
IEEE
15 years 8 months ago
Automaton-based Confidentiality Monitoring of Concurrent Programs
Noninterference is typically used as a baseline security policy to formalize confidentiality of secret information manipulated by a program. In contrast to static checking of noni...
Gurvan Le Guernic
ASIAN
2006
Springer
153views Algorithms» more  ASIAN 2006»
15 years 7 months ago
Automata-Based Confidentiality Monitoring
Abstract Non-interference is typically used as a baseline security policy to formalize confidentiality of secret information manipulated by a program. In contrast to static checkin...
Gurvan Le Guernic, Anindya Banerjee, Thomas P. Jen...