Sciweavers

1446 search results - page 225 / 290
» Formal analysis of hardware requirements
Sort
View
INFOCOM
2003
IEEE
14 years 1 months ago
Physical Topology Discovery for Large Multi-Subnet Networks
— Knowledge of the up-to-date physical (i.e., layer-2) topology of an Ethernet network is crucial to a number of critical network management tasks, including reactive and proacti...
Yigal Bejerano, Yuri Breitbart, Minos N. Garofalak...
SRDS
2003
IEEE
14 years 1 months ago
Group Communication Protocols under Errors
Group communication protocols constitute a basic building block for highly dependable distributed applications. Designing and correctly implementing a group communication system (...
Claudio Basile, Long Wang, Zbigniew Kalbarczyk, Ra...
3DPVT
2002
IEEE
172views Visualization» more  3DPVT 2002»
14 years 1 months ago
3D objects visualization for remote interactive medical applications
3D medical images produced in health centers represent tremendous amounts of data spread over different places. Automatic processing of these data often allow quantitative and rep...
Johan Montagnat, Eduardo Davila, Isabelle E. Magni...
COMPSAC
2002
IEEE
14 years 1 months ago
Resource Instantiation Policies for Software Process Environments
Process-Centered Software Engineering Environments (PSEEs) deal with activities that demand limited resources. Characteristics about required resources and their dynamic availabili...
Carla Alessandra Lima Reis, Rodrigo Quites Reis, H...
MDM
2010
Springer
301views Communications» more  MDM 2010»
14 years 25 days ago
Query m-Invariance: Preventing Query Disclosures in Continuous Location-Based Services
Abstract—Location obfuscation using cloaking regions preserves location anonymity by hiding the true user among a set of other equally likely users. Furthermore, a cloaking regio...
Rinku Dewri, Indrakshi Ray, Indrajit Ray, Darrell ...