Sciweavers

838 search results - page 115 / 168
» Propagation Redundancy in Redundant Modelling
Sort
View
NCA
2008
IEEE
14 years 3 months ago
Designing Mechanisms for Reliable Internet-based Computing
In this work, using a game-theoretic approach, costsensitive mechanisms that lead to reliable Internet-based computing are designed. In particular, we consider Internet-based mast...
Antonio Fernández Anta, Chryssis Georgiou, ...
TASE
2008
IEEE
14 years 3 months ago
Reasoning about Channel Passing in Choreography
Abstract Web services choreography describes global models of service interactions among a set of participants. For an interaction to be executed, the participants taken part in it...
Hongli Yang, Chao Cai, Liyang Peng, Xiangpeng Zhao...
VTS
2008
IEEE
104views Hardware» more  VTS 2008»
14 years 3 months ago
Signature Rollback - A Technique for Testing Robust Circuits
Dealing with static and dynamic parameter variations has become a major challenge for design and test. To avoid unnecessary yield loss and to ensure reliable system operation a ro...
Uranmandakh Amgalan, Christian Hachmann, Sybille H...
ISCAS
2007
IEEE
117views Hardware» more  ISCAS 2007»
14 years 3 months ago
Context-based Arithmetic Coding Reexamined for DCT Video Compression
—This paper presents a new context modeling technique for arithmetic coding of DCT coefficients in video compression. A key feature of the new technique is the inclusion of all p...
Li Zhang, Xiaolin Wu, Ning Zhang, Wen Gao, Qiang W...
ESORICS
2007
Springer
14 years 3 months ago
Conditional Privacy-Aware Role Based Access Control
Privacy is considered critical for all organizations needing to manage individual related information. As such, there is an increasing need for access control models which can adeq...
Qun Ni, Dan Lin, Elisa Bertino, Jorge Lobo