Sciweavers

2133 search results - page 362 / 427
» Implementation of a SystemC based Environment
Sort
View
CN
2010
94views more  CN 2010»
13 years 10 months ago
A market-based approach to managing the risk of peer-to-peer transactions
Ptrim is a purely decentralised application for performing peer-to-peer transactions. Instead of relying on a typical trust/reputation management approach, Ptrim allows its users t...
Stephanos Androutsellis-Theotokis, Diomidis Spinel...
CTW
2010
131views more  CTW 2010»
13 years 10 months ago
Human-machine collaboration through vehicle head up display interface
This paper introduces a novel design for an automotive full-windshield Head-Up Display (HUD) interface which aims to improve the driver's spatial awareness and response times...
Vassilis Charissis, Stylianos Papanastasiou
CORR
2008
Springer
145views Education» more  CORR 2008»
13 years 10 months ago
Decentralized Overlay for Federation of Enterprise Clouds
This chapter describes Aneka-Federation, a decentralized and distributed system that combines enterprise Clouds, overlay networking, and structured peer-to-peer techniques to crea...
Rajiv Ranjan, Rajkumar Buyya
ADHOC
2006
115views more  ADHOC 2006»
13 years 10 months ago
Routing characteristics of ad hoc networks with unidirectional links
Unidirectional links in an ad hoc network can result from factors such as heterogeneity of receiver and transmitter hardware, power control or topology control algorithms, or diff...
Jorjeta G. Jetcheva, David B. Johnson
COMSIS
2006
141views more  COMSIS 2006»
13 years 10 months ago
Common Web Application Attack Types and Security Using ASP.NET
Web applications security is one of the most daunting tasks today, because of security shift from lower levels of ISO OSI model to application level, and because of current situati...
Bojan Jovicic, Dejan Simic