Sciweavers

5227 search results - page 976 / 1046
» Enterprise modeling using class and instance models
Sort
View
TON
2008
86views more  TON 2008»
13 years 7 months ago
Securing user-controlled routing infrastructures
Designing infrastructures that give untrusted third parties (such as end-hosts) control over routing is a promising research direction for achieving flexible and efficient communic...
Karthik Lakshminarayanan, Daniel Adkins, Adrian Pe...
JHSN
2007
105views more  JHSN 2007»
13 years 7 months ago
A priority-aware CSMA/CP MAC protocol for the all-optical IP-over-WDM metropolitan area ring network
Abstract. The paper proposes a priority-aware MAC (Medium Access Control) protocol for a core metropolitan area network in the next generation Internet, which is an OPS (Optical Pa...
Jih-Hsin Ho, Wen-Shyang Hwang, Ce-Kuen Shieh
TOPNOC
2008
13 years 7 months ago
McMillan's Complete Prefix for Contextual Nets
Abstract. In a seminal paper, McMillan proposed a technique for constructing a finite complete prefix of the unfolding of bounded (i.e., finitestate) Petri nets, which can be used ...
Paolo Baldan, Andrea Corradini, Barbara König...
TPDS
2008
202views more  TPDS 2008»
13 years 7 months ago
Control-Based Adaptive Middleware for Real-Time Image Transmission over Bandwidth-Constrained Networks
Real-time image transmission is crucial to an emerging class of distributed embedded systems operating in open network environments. Examples include avionics mission replanning ov...
Xiaorui Wang, Ming Chen, Huang-Ming Huang, Venkita...
TROB
2008
152views more  TROB 2008»
13 years 7 months ago
Catadioptric Visual Servoing From 3-D Straight Lines
In this paper, we consider the problem of controlling a 6 DOF holonomic robot and a nonholonomic mobile robot from the projection of 3-D straight lines in the image plane of centra...
Hicham Hadj-Abdelkader, Youcef Mezouar, Philippe M...