Sciweavers

1320 search results - page 238 / 264
» Flexible Dataspace Management Through Model Management
Sort
View
DC
2007
13 years 8 months ago
Randomized self-stabilizing and space optimal leader election under arbitrary scheduler on rings
We present a randomizedself-stabilizing leaderelection protocol and a randomizedself-stabilizing token circulation protocol under an arbitrary scheduler on anonymous and unidirect...
Joffroy Beauquier, Maria Gradinariu, Colette Johne...
DSS
2007
106views more  DSS 2007»
13 years 8 months ago
An investigation of factors that influence the duration of IT outsourcing relationships
Past studies in the IT outsourcing area have examined the management of IT outsourcing relationships from a variety of perspectives. The present paper extends this line of researc...
Jahyun Goo, Rajiv Kishore, Kichan Nam, H. Raghav R...
SAC
2006
ACM
13 years 8 months ago
A domain-specific language for task handlers generation, applying discrete controller synthesis
We propose a simple programming language, called Nemo, specific to the domain of multi-task real-time embedded systems, such as in robotic, automotive or avionics systems. It can ...
Gwenaël Delaval, Éric Rutten
IJVR
2007
202views more  IJVR 2007»
13 years 8 months ago
Full Solid Angle Panoramic Viewing by Depth Image Warping on Field Programmable Gate Array
—To construct 3D virtual scenes from two-dimensional images with depth information, image warping techniques could be used. In this paper, a novel approach of cylindrical depth i...
Xiaoying Li, Baoquan Liu, Enhua Wu
TISSEC
2008
202views more  TISSEC 2008»
13 years 8 months ago
A Framework for Identifying Compromised Nodes in Wireless Sensor Networks
compromised sensor nodes. The framework provides an appropriate abstraction of applicationspecific detection mechanisms and models the unique properties of sensor networks. Based o...
Qing Zhang, Ting Yu, Peng Ning