Sciweavers

4312 search results - page 843 / 863
» Semi-User-Level Communication Architecture
Sort
View
ICEBE
2007
IEEE
174views Business» more  ICEBE 2007»
14 years 2 months ago
Worksheet-Driven UMM Modeling of B2B Services
In the development process of a B2B system it is crucial that the business experts are able to express and evaluate agreements and commitments between the partners and that the so...
Christian Huemer, Marco Zapletal, Philipp Liegl, R...
ICNS
2007
IEEE
14 years 2 months ago
A Wireless Mesh Network-based System for Hotspots Deployment and Management
— In recent years Wireless Local Area Networks (WLANs) or hotspots, as they are commonly known, have emerged as a promising networking platform to extend network connectivity in ...
Jorge Hortelano, Juan-Carlos Cano, Carlos Miguel T...
LCN
2007
IEEE
14 years 2 months ago
Node Connectivity in Vehicular Ad Hoc Networks with Structured Mobility
1 Vehicular Ad hoc NETworks (VANETs) is a subclass of Mobile Ad hoc NETworks (MANETs). However, automotive ad hoc networks will behave in fundamentally different ways than the pred...
Ivan Wang Hei Ho, Kin K. Leung, John W. Polak, Rah...
MICRO
2007
IEEE
168views Hardware» more  MICRO 2007»
14 years 2 months ago
Global Multi-Threaded Instruction Scheduling
Recently, the microprocessor industry has moved toward chip multiprocessor (CMP) designs as a means of utilizing the increasing transistor counts in the face of physical and micro...
Guilherme Ottoni, David I. August
CCS
2007
ACM
14 years 2 months ago
SecureBus: towards application-transparent trusted computing with mandatory access control
The increasing number of software-based attacks has attracted substantial efforts to prevent applications from malicious interference. For example, Trusted Computing (TC) technolo...
Xinwen Zhang, Michael J. Covington, Songqing Chen,...