Sciweavers

2057 search results - page 171 / 412
» Distributed Secure Systems: Then and Now
Sort
View
ICC
2007
IEEE
107views Communications» more  ICC 2007»
15 years 11 months ago
Evaluation of Security for DSSS Under Repeater Jamming
—Direct sequence spread spectrum (DSSS) technique has been widely used in both military communications and commercial communications. On the other hand, it is a challenge to both...
Hang Wang, Jingbo Guo, Zanji Wang
ECBS
2000
IEEE
155views Hardware» more  ECBS 2000»
15 years 9 months ago
A Component-Driven Architecture for Internet-Based, Directly Reactive Information Systems
In this paper we focus on the architecture-based development of what we call directly reactive information systems on the Internet. These systems exhibit full content management o...
René Stolle, Wilhelm Rossak, Vassilka Kirov...
DATE
2006
IEEE
82views Hardware» more  DATE 2006»
15 years 10 months ago
Performance analysis of greedy shapers in real-time systems
— Traffic shaping is a well-known technique in the area of networking and is proven to reduce global buffer requirements and end-to-end delays in networked systems. Due to these...
Ernesto Wandeler, Alexander Maxiaguine, Lothar Thi...
HICSS
2009
IEEE
215views Biometrics» more  HICSS 2009»
15 years 11 months ago
A Real World Perspective: Employee Perspectives of Employer Sponsored Personal Health Record (PHR) Systems
Many employers now provide electronic personal health records (PHR) to employees as part of a free or low cost health benefit program. This paper reports findings from a survey di...
Juanita Dawson, Benjamin L. Schooley, Bengisu Tulu
SAC
2009
ACM
15 years 11 months ago
Multi-agent system adaptation in a peer-to-peer scenario
From a system's perspective as opposed to an individual agent perspective, MAS adaptation is now becoming an important topic, since it can help to obtain expected outcomes ...
Jordi Campos Miralles, Maite López-Sá...