Sciweavers

1981 search results - page 287 / 397
» The State of Change: A Survey
Sort
View
INFOCOM
2008
IEEE
14 years 4 months ago
Competitive Analysis of Opportunistic Spectrum Access Strategies
—We consider opportunistic spectrum access (OSA) strategies for a transmitter in a multichannel wireless system, where a channel may or may not be available and the transmitter m...
Nicholas B. Chang, Mingyan Liu
SUTC
2008
IEEE
14 years 4 months ago
Security Enforcement Model for Distributed Usage Control
Recently proposed usage control concept and models extend traditional access control models with features for contemporary distributed computing systems, including continuous acce...
Xinwen Zhang, Jean-Pierre Seifert, Ravi S. Sandhu
VL
2008
IEEE
115views Visual Languages» more  VL 2008»
14 years 4 months ago
Flexible visualization of automatic simulation based on structured graph transformation
Visual modeling languages for discrete behavior modeling allow the modeler to describe how systems develop over time during system runs. Models of these languages are the basis fo...
Enrico Biermann, Claudia Ermel, Jonas Hurrelmann, ...
VTC
2008
IEEE
185views Communications» more  VTC 2008»
14 years 4 months ago
Opportunistic Spectrum Access for Energy-Constrained Cognitive Radios
This paper considers a scenario in which a secondary user makes opportunistic use of a channel allocated to some primary network. The primary network operates in a time-slotted ma...
Anh Tuan Hoang, Ying-Chang Liang, David Tung Chong...
ASWEC
2007
IEEE
14 years 4 months ago
A Configurable Event Correlation Architecture for Adaptive J2EE Applications
Distributed applications that adapt as their environment changes are developed from selfmanaging, self-configuring and self-optimising behaviours. This requires constant monitorin...
Yan Liu, Ian Gorton, Vinh Khanh Le