Sciweavers

2714 search results - page 381 / 543
» Under the table interaction
Sort
View
ICEBE
2007
IEEE
151views Business» more  ICEBE 2007»
15 years 10 months ago
Systematic Security Analysis for Service-Oriented Software Architectures
Due to the dramatic increase in intrusive activities architecture security analysis and design has emerged as an important aspect of the development of software services. It is a ...
Yanguo Liu, Issa Traoré
ICMCS
2007
IEEE
106views Multimedia» more  ICMCS 2007»
15 years 10 months ago
Toward Self-Managed Media Stream Processing Service Overlays
On-demand media stream processing service provisioning on top of a service overlay network (SON) has emerged as a promising approach to providing quality-aware and failure-resilie...
Xiaohui Gu, Philip S. Yu
ICRA
2007
IEEE
137views Robotics» more  ICRA 2007»
15 years 10 months ago
Disturbance Rejection for Biped Humanoids
— This paper proposes a simple passivity-based disturbance rejection scheme for force-controllable biped humanoids. The disturbance rejection by force control is useful not only ...
Sang-Ho Hyon, Gordon Cheng
IJCNN
2007
IEEE
15 years 10 months ago
System Identification for the Hodgkin-Huxley Model using Artificial Neural Networks
— A single biological neuron is able to perform complex computations that are highly nonlinear in nature, adaptive, and superior to the perceptron model. A neuron is essentially ...
Manish Saggar, Tekin Meriçli, Sari Andoni, ...
INFOCOM
2007
IEEE
15 years 10 months ago
Losing Opportunism: Evaluating Service Integration in an Opportunistic Wireless System
Abstract— In this paper we evaluate interactions among flowlevel performance metrics when integrating QoS and best effort flows in a wireless system using opportunistic schedul...
Hongseok Kim, Gustavo de Veciana