Sciweavers

1352 search results - page 215 / 271
» Designing Security Requirements Models Through Planning
Sort
View
TDSC
2010
157views more  TDSC 2010»
13 years 3 months ago
On the Survivability of Wireless Ad Hoc Networks with Node Misbehaviors and Failures
Network survivability is the ability of a network keeping connected under failures and attacks, which is a fundamental issue to the design and performance evaluation of wireless ad...
Fei Xing, Wenye Wang
RTCSA
2008
IEEE
14 years 3 months ago
Real-Time Communications Over Cluster-Tree Sensor Networks with Mobile Sink Behaviour
· Modelling the fundamental performance limits of Wireless Sensor Networks (WSNs) is of paramount importance to understand the behaviour of WSN under worst-case conditions and to...
Petr Jurcík, Ricardo Severino, Anis Koubaa,...
DATE
2008
IEEE
157views Hardware» more  DATE 2008»
14 years 3 months ago
Clock Distribution Scheme using Coplanar Transmission Lines
The current work describes a new standing wave oscillator scheme aimed for clock propagation on coplanar transmission lines on a silicon die. The design is aimed for clock signali...
Victor H. Cordero, Sunil P. Khatri
IPCV
2008
13 years 10 months ago
Speech Recognition System of Arabic Digits based on A Telephony Arabic Corpus
- Automatic recognition of spoken digits is one of the difficult tasks in the field of computer speech recognition. Spoken digits recognition process is required in many applicatio...
Yousef Alotaibi, Mansour Al-Ghamdi, Fahad Alotaiby
DRM
2006
Springer
14 years 16 days ago
Consumers, fans, and control: what the games industry can teach Hollywood about DRM
Through legislation and technology the film industry has been seeking to fully control usage of the bits it creates; their model is "restrictive" digital-rights manageme...
Susan Landau, Renée Stratulate, Doug Twille...