Sciweavers

1664 search results - page 188 / 333
» Testing in the Component Age
Sort
View
BROADNETS
2007
IEEE
15 years 10 months ago
Retransmission in OBS networks with fiber delay lines
— While most transmission schemes in OBS networks relegate retransmission to higher protocol layers, the scheme proposed in this paper reduces retransmission delays by exploiting ...
Kyung Joon Kwak, Edward G. Coffman Jr.
HICSS
2007
IEEE
113views Biometrics» more  HICSS 2007»
15 years 10 months ago
Does Interpersonal Trust Also Matter? Exploring the Role of Trust in Successful IT Outsourcing
Recently, the focus of IT outsourcing has been shifting from the “what” and “why” issues to “how” companies manage outsourcing process, during which the relationship m...
Qi Cong, Patrick Y. K. Chau
ICDIM
2007
IEEE
15 years 10 months ago
An access control video watermarking method that is robust to geometric distortions
: A new video watermarking algorithm for access control is introduced. This method is content-dependent and uses the dual tree complex wavelet transform (DT CWT) to create a waterm...
Lino Coria-Mendoza, Panos Nasiopoulos, Rabab Kreid...
IEEEARES
2007
IEEE
15 years 10 months ago
Reliability Markov Chains for Security Data Transmitter Analysis
Security communication systems composed of highly reliable components may have few if any failures while undergoing heavy testing or field-usage. This paper combines (i) analysis ...
Calin Ciufudean, Bianca Satco, Constantin Filote
ADBIS
2007
Springer
74views Database» more  ADBIS 2007»
15 years 10 months ago
Preventing Orphan Requests by Integrating Replication and Transactions
Replication is crucial to achieve high availability distributed systems. However, non-determinism introduces consistency problems between replicas. Transactions are very well suite...
Heine Kolltveit, Svein-Olaf Hvasshovd