Sciweavers

2065 search results - page 316 / 413
» Using Architectural Models at Runtime: Research Challenges
Sort
View
108
Voted
USITS
2001
15 years 4 months ago
Neptune: Scalable Replication Management and Programming Support for Cluster-based Network Services
Previous research has addressed the scalability and availability issues associated with the construction of cluster-based network services. This paper studies the clustering of re...
Kai Shen, Tao Yang, Lingkun Chu, JoAnne Holliday, ...
167
Voted
ADHOC
2005
165views more  ADHOC 2005»
15 years 3 months ago
A survey on routing protocols for wireless sensor networks
Recent advances in wireless sensor networks have led to many new protocols specifically designed for sensor networks where energy awareness is an essential consideration. Most of ...
Kemal Akkaya, Mohamed F. Younis
IAT
2010
IEEE
15 years 1 months ago
Risk Analysis in Access Control Systems Based on Trust Theories
There is a need for research on the scientific base and engineering requirements for building trustworthy systems in dynamic environments. To address this need, we study risk analy...
J. Ma, Luigi Logrippo, Kamel Adi, Serge Mankovski
CA
2003
IEEE
15 years 8 months ago
Language-Driven Nonverbal Communication in a Bilingual Conversational Agent
This paper describes an animated conversational agent called Kare1 which integrates a talking head interface with a linguistically motivated human-machine dialogue system. The age...
Scott A. King, Alistair Knott, Brendan McCane
138
Voted
DAC
2004
ACM
16 years 4 months ago
Abstraction of assembler programs for symbolic worst case execution time analysis
ion of Assembler Programs for Symbolic Worst Case Execution Time Analysis Tobias Schuele Tobias.Schuele@informatik.uni-kl.de Klaus Schneider Klaus.Schneider@informatik.uni-kl.de Re...
Klaus Schneider, Tobias Schüle