Sciweavers

2446 search results - page 408 / 490
» Polyadic Concept Analysis
Sort
View
FOAL
2007
ACM
14 years 1 months ago
Requirement enforcement by transformation automata
The goal of this work is to treat safety and security policies as requirements to be composed in an aspectual style with a developing application. Policies can be expressed either...
Douglas R. Smith
ICAIL
2007
ACM
14 years 1 months ago
Mapping regulations to industry-specific taxonomies
For each industry, there exist many taxonomies that are intended for various applications. There are also multiple sources of regulations from different government agencies. Indus...
Chin Pang Cheng, Gloria T. Lau, Kincho H. Law
ICCCN
2007
IEEE
14 years 1 months ago
Exploring Load-Balance to Dispatch Mobile Sensors in Wireless Sensor Networks
In this paper, a hybrid sensor network consisting of static and mobile sensors is considered, where static sensors are used to detect events, and mobile sensors can move to event l...
You-Chiun Wang, Wen-Chih Peng, Min-Hsien Chang, Yu...
GLOBECOM
2009
IEEE
14 years 1 months ago
Multi-Frame Distributed Protocol for Analog Network Coding in Slow-Fading Channels
The wireless network scenario here is based on N users that communicate one with the others through a central relay node by adopting the Analog Network Coding (ANC) paradigm. In th...
Jonathan Gambini, Umberto Spagnolini
ICCD
2007
IEEE
109views Hardware» more  ICCD 2007»
14 years 1 months ago
Improving cache efficiency via resizing + remapping
In this paper we propose techniques to dynamically downsize or upsize a cache accompanied by cache set/line shutdown to produce efficient caches. Unlike previous approaches, resiz...
Subramanian Ramaswamy, Sudhakar Yalamanchili