Sciweavers

7475 search results - page 1364 / 1495
» Supporting use case based requirements engineering
Sort
View
ICDCS
2011
IEEE
14 years 4 months ago
Starlink: Runtime Interoperability between Heterogeneous Middleware Protocols
—Interoperability remains a challenging and growing problem within distributed systems. A range of heterogeneous network and middleware protocols which cannot interact with one a...
Yérom-David Bromberg, Paul Grace, Laurent R...
CISS
2007
IEEE
15 years 11 months ago
Differential Space-Frequency Group Codes for MIMO-OFDM
— In recent years, coherent space-frequency (SF) coded multiple-input multiple-output orthogonal frequency division multiplexing (MIMO-OFDM) systems have attracted great attentio...
Engin Zeydan, Ufuk Tureli
EMSOFT
2005
Springer
15 years 10 months ago
High-level real-time programming in Java
Real-time systems have reached a level of complexity beyond the scaling capability of the low-level or restricted languages traditionally used for real-time programming. While Met...
David F. Bacon, Perry Cheng, David Grove, Michael ...
TCC
2009
Springer
141views Cryptology» more  TCC 2009»
16 years 5 months ago
Weak Verifiable Random Functions
Verifiable random functions (VRFs), introduced by Micali, Rabin and Vadhan, are pseudorandom functions in which the owner of the seed produces a public-key that constitutes a commi...
Zvika Brakerski, Shafi Goldwasser, Guy N. Rothblum...
SIGCOMM
2009
ACM
15 years 11 months ago
Impact of IT monoculture on behavioral end host intrusion detection
In this paper, we study the impact of today’s IT policies, defined based upon a monoculture approach, on the performance of endhost anomaly detectors. This approach leads to th...
Dhiman Barman, Jaideep Chandrashekar, Nina Taft, M...
« Prev « First page 1364 / 1495 Last » Next »