Sciweavers

251 search results - page 42 / 51
» Enhanced Reliability Modeling of RAID Storage Systems
Sort
View
ATAL
2008
Springer
13 years 9 months ago
The identification of users by relational agents
Virtual agents designed to establish relationships with more than one user must be able to identify and distinguish among those users with high reliability. We descr...
Daniel Schulman, Mayur Sharma, Timothy W. Bickmore
CODES
2006
IEEE
13 years 9 months ago
Architectural support for safe software execution on embedded processors
The lack of memory safety in many popular programming languages, including C and C++, has been a cause for great concern in the realm of software reliability, verification, and mo...
Divya Arora, Anand Raghunathan, Srivaths Ravi, Nir...
SIGIR
2009
ACM
14 years 2 months ago
On social networks and collaborative recommendation
Social network systems, like last.fm, play a significant role in Web 2.0, containing large amounts of multimedia-enriched data that are enhanced both by explicit user-provided an...
Ioannis Konstas, Vassilios Stathopoulos, Joemon M....
PIMRC
2008
IEEE
14 years 2 months ago
Performance analysis of cooperative communications from MAC layer perspectives
—In recent years, cooperative communication has been proposed as a new communication paradigm that incorporates a relay node to assist the direct point-to-point transmission. By ...
Chun-Chieh Liao, Yu-Pin Hsu, Kai-Ten Feng
MUE
2007
IEEE
111views Multimedia» more  MUE 2007»
14 years 1 months ago
Securing the Pharmaceutical Supply Chain using RFID
RFID technology has been applied to a number of applications. In [5], a protocol was described how to apply RFID to currency to provide integrity (e.g. reduce counterfeiting) whil...
Brian King, Xiaolan Zhang 0003