Sciweavers

1777 search results - page 339 / 356
» Programming Cryptographic Protocols
Sort
View
CN
2007
168views more  CN 2007»
13 years 8 months ago
A MAC layer power management scheme for efficient energy delay tradeoff in a WLAN
— Energy efficient operation is of paramount importance for battery-powered wireless nodes. In an effort to conserve energy, standard protocols for WLANs have the provision for w...
Mahasweta Sarkar, Rene L. Cruz
IT
2008
159views more  IT 2008»
13 years 8 months ago
Service Oriented Architecture - Overview of Technologies and Standards
provides a powerful abstraction basically allowing to perceiving all compute resources as entities that can be dynamically discovered and composed. These entities are called servic...
Dimka Karastoyanova, Frank Leymann
TSMC
2008
237views more  TSMC 2008»
13 years 8 months ago
The CAS-PEAL Large-Scale Chinese Face Database and Baseline Evaluations
In this paper, we describe the acquisition and contents of a large-scale Chinese face database: CAS-PEAL face database. The goals of creating the CAS-PEAL face database include 1) ...
Wen Gao, Bo Cao, Shiguang Shan, Xilin Chen, Delong...
SCP
2010
155views more  SCP 2010»
13 years 7 months ago
Type inference and strong static type checking for Promela
The SPIN model checker and its specification language Promela have been used extensively in industry and academia to check logical properties of distributed algorithms and protoc...
Alastair F. Donaldson, Simon J. Gay
TECS
2010
74views more  TECS 2010»
13 years 7 months ago
Recovering from distributable thread failures in distributed real-time Java
We consider the problem of recovering from failures of distributable threads (“threads”) in distributed realtime systems that operate under run-time uncertainties including th...
Edward Curley, Binoy Ravindran, Jonathan Stephen A...