Sciweavers

1030 search results - page 188 / 206
» Performance Evaluation of Network Systems Accounting for Use...
Sort
View
COMPSAC
2009
IEEE
14 years 22 days ago
Tamper Resistance for Software Defined Radio Software
The security of software defined radio (SDR) software is essential to the trustworthiness of the overall radio system. When designing and developing security solutions for SDR sof...
Shucai Xiao, Jung-Min Park, Yanzhu Ye
CE
2008
122views more  CE 2008»
13 years 9 months ago
Ubiquitous learning website: Scaffold learners by mobile devices with information-aware techniques
The portability and immediate communication properties of mobile devices influence the learning processes in interacting with peers, accessing resources and transferring data. For...
G. D. Chen, C. K. Chang, C. Y. Wang
PDP
2007
IEEE
14 years 3 months ago
An Analytical Model of a BitTorrent Peer
— In the last years peer-to-Peer (P2P) applications are emerging as potentially important structures for information, content management and distribution. The most popular P2P ap...
Mario Barbera, Alfio Lombardo, Giovanni Schembra, ...
NOSSDAV
2009
Springer
14 years 3 months ago
Fine-grained scalable streaming from coarse-grained videos
Scalable video is an attractive option for adapting the bandwidth consumption of streaming video to the available bandwidth. Fine-grained scalability can adapt most closely to the...
Pengpeng Ni, Alexander Eichhorn, Carsten Griwodz, ...
ISNN
2010
Springer
14 years 1 months ago
Multiattribute Bayesian Preference Elicitation with Pairwise Comparison Queries
Preference elicitation (PE) is an important component of interactive decision support systems that aim to make optimal recommendations to users by actively querying their preferen...
Shengbo Guo, Scott Sanner