Sciweavers

1580 search results - page 137 / 316
» Non-Interference Through Determinism
Sort
View
EOR
2006
105views more  EOR 2006»
13 years 10 months ago
Evaluating cost taxonomies for information systems management
The consideration of costs, benefits and risks underpin many Information System (IS) evaluation decisions. Yet, vendors and project-champions alike tend to identify and focus much...
Zahir Irani, Ahmad Ghoneim, Peter E. D. Love
CORR
2007
Springer
109views Education» more  CORR 2007»
13 years 10 months ago
The General Gaussian Multiple Access and Two-Way Wire-Tap Channels: Achievable Rates and Cooperative Jamming
—The general Gaussian multiple-access wiretap channel (GGMAC-WT) and the Gaussian two-way wiretap channel (GTW-WT) are considered. In the GGMAC-WT, multiple users communicate wit...
Ender Tekin, Aylin Yener
JCP
2008
120views more  JCP 2008»
13 years 10 months ago
Multimedia Resource Replication Strategy for a Pervasive Peer-to-Peer Environment
The computer world is experiencing a paradigm shift towards context-aware pervasive computing, where diverse computer devices communicate with each other through different network ...
Letian Rong
COMCOM
2004
84views more  COMCOM 2004»
13 years 10 months ago
A self-extracting accurate modeling for bounded-delay video services
This article proposes the XGOP-B deterministic traffic model for MPEG video services requiring strict bounds on the quality of service provided by the network. The XGOP-B model ta...
Marcelo Dias de Amorim, Otto Carlos Muniz Bandeira...
CAD
2002
Springer
13 years 10 months ago
Product variety optimization under modular architecture
This paper discusses product variety design under optimization viewpoint. Product variety design means the challenge to simultaneously design multiple products toward higher optim...
Kikuo Fujita