Sciweavers

2699 search results - page 436 / 540
» On Evaluating the Performance of Security Protocols
Sort
View
RTAS
2000
IEEE
14 years 6 days ago
Chocolate: A Reservation-Based Real-Time Java Environment on Windows/NT
In this paper, we present Chocolate, a reservation-based Real-Time Java run-time environment that runs on Windows NT. We first present a brief overview of the emerging RealTime Ja...
Dionisio de Niz, Ragunathan Rajkumar
EUROMICRO
2009
IEEE
13 years 11 months ago
Service Redundancy Strategies in Service-Oriented Architectures
Redundancy can improve the availability of components in service-oriented systems. However, predicting and quantifying the effects of different redundancy strategies can be a comp...
Nicholas R. May, Heinz W. Schmidt, Ian E. Thomas
ATVA
2006
Springer
114views Hardware» more  ATVA 2006»
13 years 11 months ago
Selective Approaches for Solving Weak Games
Abstract. Model-checking alternating-time properties has recently attracted much interest in the verification of distributed protocols. While checking the validity of a specificati...
Malte Helmert, Robert Mattmüller, Sven Schewe
SAC
2010
ACM
13 years 8 months ago
Visual processing-inspired fern-audio features for noise-robust speaker verification
In this paper, we consider the problem of speaker verification as a two-class object detection problem in computer vision, where the object instances are 1-D short-time spectral v...
Anindya Roy, Sébastien Marcel
JCST
2008
144views more  JCST 2008»
13 years 7 months ago
Beacon-Less Geographic Routing in Real Wireless Sensor Networks
Geographic Routing (GR) algorithms, require nodes to periodically transmit HELLO messages to allow neighbors know their positions (beaconing mechanism). Beacon-less routing algorit...
Juan A. Sánchez, Rafael Marín-P&eacu...