Sciweavers

1352 search results - page 225 / 271
» Designing Security Requirements Models Through Planning
Sort
View
CIDR
2003
123views Algorithms» more  CIDR 2003»
13 years 10 months ago
A Case for Staged Database Systems
Traditional database system architectures face a rapidly evolving operating environment, where millions of users store and access terabytes of data. In order to cope with increasi...
Stavros Harizopoulos, Anastassia Ailamaki
ENTCS
2008
110views more  ENTCS 2008»
13 years 9 months ago
Performance Evaluation of Elastic GALS Interfaces and Network Fabric
This paper reports on the design of a test chip built to test a) a new latency insensitive network fabric protocol and circuits, b) a new synchronizer design, and c) how efficient...
JunBok You, Yang Xu, Hosuk Han, Kenneth S. Stevens
ROBIO
2006
IEEE
129views Robotics» more  ROBIO 2006»
14 years 2 months ago
Learning Utility Surfaces for Movement Selection
— Humanoid robots are highly redundant systems with respect to the tasks they are asked to perform. This redundancy manifests itself in the number of degrees of freedom of the ro...
Matthew Howard, Michael Gienger, Christian Goerick...
GLOBECOM
2010
IEEE
13 years 6 months ago
Multicasting in Delay Tolerant Networks: Delegation Forwarding
Delay tolerant networks (DTNs) are a kind of wireless mobile network which may lack continuous network connectivity. Multicast supports the distribution of data to a group of users...
Yunsheng Wang, Xiaoguang Li, Jie Wu
APSEC
2005
IEEE
14 years 2 months ago
Automated Refactoring of Objects for Application Partitioning
Distributed infrastructures are becoming more and more diverse in nature. An application may often need to be redeployed in various scenarios. Ideally, given an application design...
Vikram Jamwal, Sridhar Iyer