Sciweavers

13181 search results - page 2594 / 2637
» Design and Implementation of Cohesion
Sort
View
JCS
2008
119views more  JCS 2008»
13 years 11 months ago
Synthesising verified access control systems through model checking
We present a framework for evaluating and generating access control policies. The framework contains a modelling formalism called RW, which is supported by a model checking tool. ...
Nan Zhang 0003, Mark Ryan, Dimitar P. Guelev
CORR
2007
Springer
151views Education» more  CORR 2007»
13 years 11 months ago
Exploiting Multi-Antennas for Opportunistic Spectrum Sharing in Cognitive Radio Networks
—In cognitive radio (CR) networks, there are scenarios where the secondary (lower priority) users intend to communicate with each other by opportunistically utilizing the transmi...
Rui Zhang, Ying-Chang Liang
CSJM
2007
150views more  CSJM 2007»
13 years 11 months ago
An approach for NL text interpretation
For modeling the interpretation process of NL sentences we use the mechanisms implying semantic networks that assure syntactic – semantic text interpretation (SSI), including an...
Anatol Popescu, Sergiu Cretu
JRTIP
2008
118views more  JRTIP 2008»
13 years 11 months ago
Custom parallel caching schemes for hardware-accelerated image compression
Abstract In an effort to achieve lower bandwidth requirements, video compression algorithms have become increasingly complex. Consequently, the deployment of these algorithms on Fi...
Su-Shin Ang, George A. Constantinides, Wayne Luk, ...
JSAC
2008
118views more  JSAC 2008»
13 years 11 months ago
PEEC: a channel-adaptive feedback-based error
Reliable transmission is a challenging task over wireless LANs since wireless links are known to be susceptible to errors. Although the current IEEE802.11 standard ARQ error contro...
Sohraab Soltani, Hayder Radha
« Prev « First page 2594 / 2637 Last » Next »