Sciweavers

483 search results - page 45 / 97
» Reachability Analysis of Hybrid Systems Using Support Functi...
Sort
View
CASES
2003
ACM
14 years 1 months ago
Encryption overhead in embedded systems and sensor network nodes: modeling and analysis
Recent research in sensor networks has raised issues of security for small embedded devices. Security concerns are motivated by the deployment of a large number of sensory devices...
Ramnath Venugopalan, Prasanth Ganesan, Pushkin Ped...
SIGMETRICS
1987
ACM
102views Hardware» more  SIGMETRICS 1987»
13 years 12 months ago
Delay Analysis of a Window Tree Conflict Resolution Algorithm in a Local Area Network Environment
Expressions are found for the throughput and delay performance of a Tree Conflict Resolution Algorithm that is used in a Local Area Network with carrier sensing (and possibly also ...
George C. Polyzos, Mart Molle
ER
2004
Springer
169views Database» more  ER 2004»
14 years 1 months ago
Intentional Modeling to Support Identity Management
Identity management has arisen as a major and urgent challenge for internet-based communications and information services. Internet services involve complex networks of relationshi...
Lin Liu, Eric S. K. Yu
HYBRID
2009
Springer
14 years 3 months ago
The Optimal Boundary and Regulator Design Problem for Event-Driven Controllers
Event-driven control systems provide interesting benefits such as reducing resource utilization. This paper formulates the optimal boundary and regulator design problem that minim...
Pau Martí, Manel Velasco, Enrico Bini
IUI
2010
ACM
14 years 3 months ago
Automatically identifying targets users interact with during real world tasks
Information about the location and size of the targets that users interact with in real world settings can enable new innovations in human performance assessment and software usab...
Amy Hurst, Scott E. Hudson, Jennifer Mankoff